ECIW 2009
   ECIW 2008 Home
   Photo Gallery
   Proceedings 2008
   Venue Information
   ECIW Future
   ECIW Past
   Research Seminars
   Sponsorship and
   Exhibitor Information
   About ACI
ECIW 2008
Home >> ECIW >> ECIW 2008 >> eciw08-proceedings
WWW ACI   At a glance Calendar Contact us

Proceedings of ECIW 2008
The 7th European Conference on Information Warfare and Security
held at the University of Plymouth, UK
30 June – 1 July 2008


The proceedings for this conference are listed on the Index to Scientific and Technical Proceedings (ISTP/ISI Proceedings), the Index to Social Sciences & Humanities Proceedings (ISSHP) and the Index to Social Sciences & Humanities Proceedings (ISSHP/ISI Proceedings).



The proceedings of the above conference are now available to purchase in two formats, Book or CD-ROM:

UK AND EUROPE: Cost, including post and packing is £60.00

REST OF THE WORLD: Cost, including post and packing is £65.00

Cost for CD is £50, including post and packing, to UK and Europe and £55 to anywhere else in the world.

The Contents of the Proceedings are shown below.

If you would like to download and read the Abstracts of the papers presented at the Conference, please click here

To order the Proceedings, please click here

Search the full text of this proceedings



Paper Title


Page No.




Biographies of Conference Chairs, Programme Chair, Keynote Speaker and Mini-track Chairs



Biographies of contributing authors



SANAsms: Secure Short Messaging System for Secure GSM Mobile Communication

Nor Badrul Anuar, Muhammad Azlan Ibrahim, Ainuddin Wahid Abdul Wahab and Omar Zakaria
University of Malaya, Kuala Lumpur, Malaysia


Information Security at Airports

Katalin Emese Bite
Budapest University of Technology and Economics, Hungary


A Multi-layered Security Architecture for Modelling Critical Infrastructure

Clive Blackwell
Royal Holloway, University of London, Egham, UK


NetS-X - The Network Security Experience

Alice Boit, Helmut Eirund, Thomas Geimer, Joao Collier de Mendonca, Alexander Ott, and Richard Sethmann
University of Applied Sciences Bremen, Germany


A Study on the Security of RFID with Enhancing Privacy Protection

Henry Ker-Chang Chang, Li-Chih Yen and Wen-Chi Huang
Chang Gung University Tao-Yuan Taiwan, ROC


Hacking the Human: Countering the Socially Engineered Attack

Andrea Cullen1 and Ian Mann2
University of Bradford UK
2ECSC Ltd Bradford UK


Malware Analysis: The Art of Detecting Malicious Activities

Fadi El-moussa and Andy Jones
BT Security Research Centre, Adastral Park, Ipswich, UK


Malware-Based Information Leakage Over IPSEC Tunnels

Eric Filiol1, Frédéric Jennequin1  and Delaunay Guillaume2
1Army Signals Academy (ESAT)
Rennes France
2Université Rennes I, Saint-Malo France


Towards Fit for Purpose Security in Military Systems

Linda Finch and Richard Vaughan
General Dynamics United Kingdom Limited, Newbridge ,UK


A Simple Metric for Interdependencies in the Technological Networks

Vincenzo Fioriti and Annamaria Fioriti
Ente per le Nuove Tecnologie, l’Energia e l’Ambiente Roma, Italy


3D Tactics and Information Deception

Chris Flaherty
Visiting Fellow, University of New South Wales, Australia


Malicious Electromagnetic (EM) Threats to Information Processing Installations – How do we Respond and Protect?

Richard Hoad1 and Iain Sutherland2
1QinetiQ Ltd, Farnborough, UK
2University of Glamorgan, Wales, UK


Propaganda Dilemmas for Environmental Security

William Hutchinson
Edith Cowan University Perth Australia


Ensuring Privacy in a Network Centric Environment

Anssi Kärkkäinen and Catharina Candolin
The Finnish Defence Forces Helsinki Finland


Validation of 1-N OT Algorithms in Privacy-Preserving Investigations

Zbigniew Kwecka, William Buchanan, Duncan Spiers and Lionel Saliou
School of Computing, Napier University, Edinburgh, UK


Publication of Ministry of Defence Strategy As a Semiotic Sign

Marko Laaksonen
National Defence University Helsinki Finland


The Finnish Defence Forces C4ISR System from Systems Thinking Perspective

Martti Lehto
National Defense University Helsinki, Finland


Unknown Malicious Code Detection – Practical Issues

Robert Moskovitch and Yuval Elovici
Ben Gurion University, Beer Sheva, Israel


“Where you are” Based Authentication: An Improved Security Protocol Using BAN Logic

Nabih Abdelmajid 1, Hossain Alamgir 1, Simon Shepherd1, and Khaded Mahmoud2
1University of Bradford, UK
2Zarqa Private University, Jordan


Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective

Rain Ottis
Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia


An Ontology Based Approach to Data Surveillance

Teresa Pereira1 and Henrique Santos2
Polytechnic Institute of Viana do Castelo Valença Portugal
2University of Minho Guimarães, Portugal


Is a Computational Grid a Suitable Platform or High Performance Digital Forensics?

Nick Pringle and Iain Sutherland
University of Glamorgan Wales UK


Considerations for Modelling Critical Infrastructure Systems

Graeme Pye and Matthew Warren
Deakin University, Geelong, Australia


Operational Security, Manipulation of Information, and Decision-Making in Network-Enabled Warfare

Petri Siivonen
Finnish CIS School, Signals Regiment, Finland


Structured Textual Data Monitoring Based on a Rough Set Classifier

Sérgio Tenreiro de Magalhães1, Leonel Santos2, Luís Amaral2, Henrique Santos2, Kenneth Revett3, and Hamid Jahankhani4
1Universidade Católica Portuguesa Braga Portugal
2University of Minho Guimarães Portugal
3University of Westminster London, UK
4University of East London UK


Electronic Activism: Threats, Implications and Responses

Allen Wareham1 and Steven Furnell1, 2
University of Plymouth UK
2Edith Cowan University Perth Australia


Can an Adapted Clinical Governance Model be used to Improve Medical Information Security?

Patricia Williams
Edith Cowan University, Perth, Australia


A Modular Data Mining Architecture for Intrusion Detection Systems’ Data

Konstantinos Xynos and Andrew Blyth
University of Glamorgan, Wales, UK



Updated 2 July 2008

Academic Conferences Limited - Curtis Farm, Kidmore End, Nr Reading, RG4 9AY, England - Tel: +44 (0)1189 724148 - Fax: +44 (0)1189 724691
eMail: Copyright 2008 Academic Conferences Limited - registered in England - No: 4719488 - VAT No: 812 5366 38