ECIW 2012 Home
   Call for Papers
   Submission Guide
   Abstract Submission
   Proof Reading
   Committee
   Abstracts Selected
   Programme
   Registration
   Practical Information
   Proceedings 2011
   ECIW Past & Future
   Seminars
   Advertisers
   Exhibitors
   Publishers
   Sponsors
   About ACI
ECIW 2012
5-6 July, Laval, France
Home >> ECIW >> ECIW 2012 >> eciw12-abstracts
WWW ACI   At a glance Calendar RSS Feed Contact us

 

 

Abstracts selected

The closing date for abstract submissions is 16 December 2011. (extended until 6 January 2012)  The review panel has completed the selection process for all abstracts received and this page lists the abstracts selected for submission as full papers. In order to preserve the double blind review process, the paper titles are listed in no particular order and the author names have been sorted by lead author surname.


Full papers are due not later than 3 February 2012.
Authors are advised that this is a FINAL date. Earlier submission of the full paper helps us to manage the review process in a timely manner. Please read the style guidelines document and the submission guidelines page. Papers should be submitted as soon as they are ready as .doc or .rtf file attachments by email to the Conference Manager, Charlotte Hall with the paper submission checklist and copyright form, which are available from the download area on the top of the At a Glance page.

 

Publication opportunity

Papers accepted for the conference will be published in the conference proceedings, subject to author registration and payment. Selected papers presented at Conference will be considered for publication in a special issue of the Journal of Information Warfare: http://www.jinfowar.com. Click here to read an extract. Additionally, selected papers  from the conference will be considered for publication in the International Journal of Electronic Security and Digital Forensics published by Inderscience UK (ISSN:1751-1911X).


You can see an outline programme on the programme page. 
  Stay informed, join the conference mailing list

 

 


 

 

Paper titles (in no particular order)

Design & Implementation of Certificateless PKI using open source tools

A Weapons and Tactics Function and Approcah to Cyber Defense

Steganalysis and Analysis of Hidden data in Images

Law of Armed Conflicts applied to i-Warfare and Information Operations; How and Under what Legal Framework Should Surgical NATO and U.S. Military Drone Strikes be Conducted?

Export/ Diffusion of Technical of Knowledge: Strategic Threat or strategic Vantage? The case of System/Information Security

Cyber Threat Management in Cognitive Networks

The Comprehensive Approach as a Design to Run the Military-Industrial Complex in Operations

A Plead for Security and Intelligence Education within Romanian Antreprenorial Environment

From Kinetic Warfare to Strategic Communications as a Proactive and Mind-Centric Paradigm of the Art of War

A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict

From Perception Management to Communication Strategy

Overt Information Operations During Peacetime

Critical databases - Towards a Framework to Protect South Africa's key Information Infrastructures

Recent Cyberwar Spectrum and its Analysis

Multi factor Profiling Techniques for Authentication

Governance of Cyber Security in South Africa

Geovisualization as Design Strategy in Voter's Perception Management System

MLS Cannot Realise the Objectives of Network Enabled Capabilities (NEC)

Towards an Automated Security Awareness System in a Virtualized Environment.

Who are you Today? Profiling the ID Theft Fraudster

Matching Attack Patterns to Security Patterns using Neural Networks

The Realities of Cyber Conflict

CNA by Social Media, or is it 5th Generation Warfare

Finding Suspicious Activity on Computer Systems Captured During Military Operations

Building An Ontology for Cyberterrorism

A Non-Militarised Approach to Cyber Security

The Meaning of the Concept of “Ambidexterity” and the Concept of “Resilience”in the Military Planning Process

A Cloud-based Resource and Service Sharing Platform for Computer and Network Security Education

Security Management System for 4G Heterogeneous Networks

The use of Biometric in Controlling Foreign Workers in Malaysia

An Exceptional war that Ended in Victory for Estonia - or an Ordinary E-disturbance? Estonian Narratives of the Cyber-Attacks in 2007

Psychological Warfare: Understanding Religious Extremism from Psychological Perspective

Military Leader and Power - an Analysis in the Three Dimensions of Power

Electricity: A Natural Resource

Life at the screen: 'Digital Finland'

The Decision to Attack: Military and Intelligence Cyber Decision-making

Designing Secure Architectures using Security Patterns

Scan Detection System using Artificial Neural Networks

Threat Evaluation in Command and Control Simulation

Modelling Emergency Response Communication Systems

User-Side Password Authentication: A Study

A Common Information Security Language: An Introduction

Simulation Approach for Military Cyber Operations

Volunteer-based cyber Defense Organizations

Metrics Framework of Cyber Operations on Command and Control

Secret Sharing for High Security Codes on Smart Cards

Proposal for a new Equation System Modelling of Block Ciphers

A Secure Identity and Access Management System using Semantic Framework

A Process for Boundary Clean-Up at the Enterprise Level

Communitary Law and Internet Traffic Control lost Between Privacy Rights and Freedom of Individual and Corporate Enterprise

Information Warfare and Deception in Kosovo war. A case study

The Susceptibility of the South African Broadcast Media to be used as a Tool for Information Warfare

Information Systems Security Management (ISSM) Success Factor: Retrospection from the Scholars

Hidden Markov Model-based Network Anomalies Detection

Novel Tracking of Rogue Network Packet Using Danger Theory Approcah

Gesture Dynamics with Skin Conductivity - a Multimodal Approach to Biometric Authentication

The Rise of the Abnormal: Vulnerability to Corporate Crime

SCADA Security: A baseline Security Approach

Multilevel user Verification with Intelligent Artificial Neural Network

Security and Safety Education in the Czech Republic and eSEC-portal user's Requirements

Cloud Computing and Security

Unconventional Attack Against Voting Machines

 

Author names (by lead author surname)

Abouzakhar Nasser, University of Hertfordshire. UK; Ruchi Jain, University of Hertfordshire. UK

Jansen van Vuuren Joey, CSIR, South Africa: Jackie Phahlamohlaka, CSIR, South Africa

Adams Andrew, Meiji University, Japan: Pauline Reich, Waseda University, Japan: Stuart Weinstein, University of Hertfordshire, United Kingdom

Jellenc Eli, Verisign - iDefense Security Intelligence Services, UK

Adebiyi Adetunji, University of East London, UK: Chris Imafidon, University of East London, UK: Johnnes Arreymbi, University of East London, UK

Kantola Harry, Finnish National Defense University, Finland

Alenius Kari, University of Oulu, Department of History, Finland

Karkkainen Anssi, Finnish Defence Forces, Finland

Alnajjar Adeeb, De Montfort University, UK: Helge Janicke, De Montfort University, UK

Labuschagne William Aubrey, CSIR, South Africa: Mariki Eloff, UNISA, South Africa

Alquhayz Hani, De Montfort University, UK: Ali Al-Bayatti, De Montfort University, UK: Amelia Platt, De Montfort University, UK

Malanik David, FAI TBU in Zlin. Czech Republic; Roman Jasek, FAI TBU in Zlin. Czech Republic; Radek Vala, FAI TBU in Zlin. Czech Republic

Angelopoulou Olga, University of Derby, UK: Stilianos Vidalis, University of Newport, UK

Matthew Warren, Deakin Univeristy. Australia; Shona Leitch, Deakin Univeristy. Australia

Arwood Sam, 561 Network Operations Squadron, USA: Anthony Meadows, 561 Network Operations Squadron, USA: Sunil Amin, 561 Network Operations Squadron, USA

Morton Ben, Royal Military College of Canada Computer Security Laboratory, Canada: Sylvain Leblanc, Royal Military College of Canada Computer Security Laboratory, Canada: Melanie Bernier, Defence Research and Development Canada Centre for Operational Research and Analysis, Canada

Arwood Sam, 561 Network Operations Squadron, USA: Kory Harris, 561 Network Operations Squadron, USA: Johnath Carmichael, 561 Network Operations Squadron, USA

Njotini Mzukisi, University of South Africa (UNISA), South Africa

Aslanoglu Rabia, izmir institute of technology, Turkey: Selma Tekir, izmir institute of technology, Turkey

Nordin Ariza, Universiti Teknologi MARA, Malaysia: Azman Mohd Yusof, Universiti Teknologi MARA, MALAYSIA

Azah Anir Norman, University of Malaya. Malaysia; Norizan Mohd Yasin, University of Malaya. Malaysia

Ottis Rain, NATO CCD COE, Estonia

Bernier Melanie, Defence Research and Development Canada Centre for Operational Research and Analysis, Canada: Sylvain Leblanc, Royal Military College of Canada Computer Security Laboratory, Canada: Ben Morton, Royal Military College of Canada Computer Security Laboratory, Canada

Podins Karlis, Cooperative Cyber Defence Centre of Excellence, Estonia: Christian Czosseck, Cooperative Cyber Defence Centre of Excellence, Estonia

Brantly Aaron, University of Georgia, United States

Pye Graeme, Deakin University, Australia: Matthew Warren, Deakin University, Australia

Cardoso Abilio, Universidade Portucalense. Portugal; Paulo Simões, Dep Eng Informatica, Polo II da Universidade de Coimbra, 3030-290 Coimbra. Portugal

Rantapelkonen Jari, National Defence University, Finland: Saara Jantunen, National Defence University, Finland

Ciuperca Ella Magdalena, National Intelligence Academy "Mihai Viteazul", Romania

Ribeiro Francisco, Universidade do Minho, Portugal: Henrique Santos, Universidade do Minho, Portugal

Crocker Paul, Universidade da Beira Interior, Departamento de Informática Instituto de Telecomunicações, Portugal: Adolfo Peixinho, University of Beira Interior, Portugal: Simão Melo de Sousa, University of Beira Interior, Portugal

Rowe Neil, U.S. Naval Postgraduate School, United States

Dambo Tamunosiki, University of Surrey, Nigerian

Sa Vitor, Universidade Católica Portuguesa, Portugal: Filipe Cerqueira Alves, Universidade Católica Portuguesa, Portugal

Dubois Michel, ESIEA - CVO, France: Eric Filiol, ESIEA - CVO, France:  , , :  , ,

Sa Vitor, Universidade Católica Portuguesa. Portugal; Henrique Santos, Universidade do Minho. Portugal; Sérgio T. Magalhães, Universidade Católica Portuguesa. Portugal

Fernandez Eduardo, Florida Atlantic University, USA

Salminen Mirva, University of Lapland, Finland: Aki-Mauri Huhtinen, Finnish National Defence University, Finland

Filiol Eric, ESIEA - CVO Lab, France

Sarga Libor, Tomas Bata University in Zlín, Czech Republic: Roman Jasek, Tomas Bata University in Zlín, Czech Republic

Gleason Kevin, KMG Consulting Group, USA

Sauffiyan Ahmad, Centre for Media and Information Warfare Studies, Malaysia: Anitawati Mohd Lokman, Centre for Media and Information Warfare Studies, Malaysia: Rajib Ghani, Centre for Media and Information Warfare Studies, Malaysia

Hassan Kamal Halili, Universiti Kebangsaan Malaysia, Malaysia: Rohani Rahim, Universiti Kebangsaan Malaysia, Malaysia

Siren Torsti, National Defence University, Finland, Finland

Hirvela Arto, National Defence University Finland, Finland

Tekir Selma, Izmir Institute of Technology, Turkey

Hlihor Constantin, Dimitrie Cantemir Christian University, Romania

Tomesh Jain, Pragati Enineering College, India: S V Ramanamurthy, Pragati Engineering, INDIA: N Vijayarangan, Tata Consultancy Services, INDIA

Huang Dijiang, Arizona State University, United States: Samia Bouzefrane, CNAM, France

Uwagbole Solomon, School of Computing, Edinburgh Napier University. Scotland, U.K; William Buchanan, School of Computing, Edinburgh Napier University. Scotland, U.K; Lu Fan, School of Computing, Edinburgh Napier University. Scotland, U.K

Hugl Ulrike, University of Innsbruck. Austria

Vala Radek, Tomas Bata University in Zlín, Faculty of Applied Informatics. Czech Republic; Roman Jasek, Tomas Bata University in Zlín, Faculty of Applied Informatics. Czech Republic; Malaník David, Tomas Bata University in Zlín, Faculty of Applied Informatics. Czech Republic

Huhtinen Aki-Mauri, FDNU, Finland

Van Rooyen Seanette, CSIR, South Africa: Louise Leenen, CSIR, South Africa

Hyacinthe Berg P, CERSA / CNRS FRANCE, France

Veerasamy Namosha, Council for Scientific and Industrial Research and University of Johannesburg, South Africa: Marthie Grobler, Council for Scientific and Industrial Research and University of Johannesburg, South Africa: Basie von Solms, University of Johannesburg, South Africa

Jain Amit, BenefitFocus Inc, United States: Csilla Farkas, CSE, University of South Carolina, United States

Verkoelen Cor, TNO, The Netherlands: Harm Schotanus, TNO, The Netherlands: Tim Hartog, TNO, The Netherlands

Jansen van Vuuren Joey, CSIR, South Africa: Anna-Marie Jansen van Vuuren, University of the Witwatersrand, South Africa: Suna Venter, South Africa

Viitasalo Janne, National Defence University, Finland

 

Zakaria Omar, National Defence University of Malaysia (UPNM), Malaysia: Mohd Afizi Mohd Shukran, National Defence University of Malaysia (UPNM), Malaysia

 

 

 

Last updated  15 February 2012

 

 

 

Academic Conferences Limited - Curtis Farm, Kidmore End, Nr Reading, RG4 9AY, England - Tel: +44 (0)1189 724148 - Fax: +44 (0)1189 724691
eMail: info@academic-conferences.org- Copyright 2003-2011 Academic Conferences Limited - registered in England - No: 4719488 - VAT No: 812 5366 38