Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/eciw:"
@inproceedings{DBLP:conf/eciw/Ashenden05, author = {Debi Ashenden}, title = {Governance Principles for Sharing Information in the Network Enabled Capability {(NEC)} Environment}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {1--8}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Thu, 23 Jun 2016 15:53:29 +0200}, biburl = {https://dblp.org/rec/conf/eciw/Ashenden05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/AvourdiadisB05, author = {Nikolaos Avourdiadis and Andrew Blyth}, title = {Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {9--20}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/AvourdiadisB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/BalopoulosDGKKG05, author = {Theodoros Balopoulos and Stelios Dritsas and Lazaros Gymnopoulos and Maria Karyda and Spyros Kokolakis and Stefanos Gritzalis}, title = {Incorporating Security Requirements Into the Software Development Process}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {21--28}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eciw/BalopoulosDGKKG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/BaskervilleS05, author = {Richard L. Baskerville and Robert Sainsbury}, title = {Securing Against the Possibility of an Improbable Event: Concepts for Managing Predictable Threats and Normal Compromises}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {29--38}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eciw/BaskervilleS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/BlundellDSTW05, author = {Barry Blundell and Huang Xiao Dong and Jill Slay and Benjamin P. Turnbull and Tom Wilsdon}, title = {Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {39--46}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/BlundellDSTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/BuchananGSSM05, author = {William J. Buchanan and Jamie Graves and Lionel Saliou and Hussain Al Sebea and Nikos Migas}, title = {Agent-based Forensic Investigations with an Integrated Framework}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {47--52}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Tue, 06 Sep 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/BuchananGSSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/BusuttilW05, author = {T. B. Busuttil and Matthew J. Warren}, title = {An Approach for Critical Information Infrastructure Protection}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {53--62}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/BusuttilW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/Candolin05, author = {Catharina Candolin}, title = {Securing the Infrastructure in Information Operations}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {63--72}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/Candolin05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/Darnton05, author = {Geoffrey Darnton}, title = {Content Analysis as a Tool of Information Warfare}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {73--82}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/Darnton05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/Efthymiopoulos05, author = {Marios Panagiotis Efthymiopoulos}, title = {Is {NATO} in Need of a Renewed Security Concept?}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {83--90}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/Efthymiopoulos05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/FragkosB05, author = {Grigorios Fragkos and Andrew Blyth}, title = {Architecture for Near Real-Time Threat Assessment Using {IDS} Data}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {91--98}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/FragkosB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/FragkosXB05, author = {Grigorios Fragkos and Konstantinos Xynos and Andrew Blyth}, title = {The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {99--106}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/FragkosXB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/GymnopoulosG05, author = {Lazaros Gymnopoulos and Stefanos Gritzalis}, title = {Introducing Ontology-based Security Policy Management in the Grid}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {107--116}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/GymnopoulosG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/HoadB05, author = {Richard Hoad and Andrew Blyth}, title = {Electromagnetic {(EM)} Susceptibility of information Systems - The Need for Em Detection}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {117--128}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/HoadB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/HughesW05, author = {Kay Hughes and Simon R. Wiseman}, title = {Analysis of Information Security Risks: Policy for Protection Through to Implementation}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {129--140}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/HughesW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/Huhtinen05, author = {Aki{-}Mauri Huhtinen}, title = {Pre-emptive Military Action: The Fight for Recipients - War as a Part of Story Society Created by the Media}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {141--150}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/Huhtinen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/Hutchinson05, author = {William Hutchinson}, title = {The 'Will' and Information Operations}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {151--156}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/Hutchinson05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/KimsoeunKI05, author = {Lory Kimsoeun and Takakazu Kurokawa and Keisuke Iwai}, title = {Finite Field Parallel Multiplier for {FPGA}}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {157--164}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/KimsoeunKI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/Kuokkanen05, author = {Pertti Kuokkanen}, title = {Risk Consequence Analysis as a Part of Anticipatory Decision-Making Using a Bayesian Network}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {165--174}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/Kuokkanen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/KuusistoKA05, author = {Rauno Kuusisto and Tuija Kuusisto and Leigh Armistead}, title = {Common Operational Picture, Situation Awareness and Information Operations}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {175--186}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/KuusistoKA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/KuusistoKY05, author = {Tuija Kuusisto and Rauno Kuusisto and Terhi Yliniemi}, title = {Information Needs of Strategic Level Decision-Makers in Crisis Situations}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {187--194}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/KuusistoKY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/LewelingW05, author = {Tara Leweling and Ron Walters}, title = {The Evolution of {US} Military Conceptions of Information Warfare and Information Operations, 1979-2004: An Initial Report}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {195--204}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/LewelingW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/LlamasMA05, author = {David Llamas and Alan Miller and Colin Allison}, title = {An Evaluation Framework for the Analysis of Covert Channels in the {TCP/IP} Protocol Suite}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {205--214}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/LlamasMA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/Lubbers05, author = {Eveline Lubbers}, title = {The Threat Response Spy Files: {A} Case Study About an Arms Manufacturer, a Private Intelligence Company and Many Infiltrators}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {215--224}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/Lubbers05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/MeeS05, author = {Vivienne Mee and Iain Sutherland}, title = {Windows Event Logs and Their Forensic Usefulness}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {225--238}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/MeeS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/MoustakasDR05, author = {Evangelos Moustakas and Penny Duquenoy and C. Ranganathan}, title = {Phish or Treat? Understanding the Tactics and Responses to Electronic Identity Theft on the Internet}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {239--248}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/MoustakasDR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/PyeW05, author = {Graeme Pye and Matthew J. Warren}, title = {Australian Commercial - Critical Infrastructure Management Protection}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {249--360}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eciw/PyeW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/Rantapelkonen05, author = {Jari Rantapelkonen}, title = {Targeting a Warlord - The Challenges of Information Operations in Afghanistan}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {261--270}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/Rantapelkonen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/RazakFB05, author = {Shukor Abd Razak and Steven Furnell and Phillip J. Brooke}, title = {A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {271--280}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Mon, 24 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/RazakFB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/ReadB05, author = {Huw Read and Andrew Blyth}, title = {Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {281--292}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/ReadB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/Rowlingson05, author = {Robert Rowlingson}, title = {Inside and out? The Information Security Threat From Insiders}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {293--302}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/Rowlingson05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/SaliouBGM05, author = {Lionel Saliou and William J. Buchanan and Jamie Graves and Jose Munoz}, title = {Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {303--312}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/SaliouBGM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/SalmensuuKV05, author = {Ville Salmensuu and Joakim Koskela and Teemupekka Virtanen}, title = {Security in Symbian Smartphones: Threats, Needed Functionalities and Existing Implementations}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {313--324}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/SalmensuuKV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/SchouKA05, author = {Corey D. Schou and Dan Kuehl and Leigh Armistead}, title = {Information Operations Education: Lessons Learned from Information Assurance}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {325--334}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/SchouKA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/SillanpaaVV05, author = {Pekka Sillanp{\"{a}}{\"{a}} and Mikko Voipio and Teemupekka Virtanen}, title = {Technical Comparison of Domain Keys and Sender {ID}}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {335--344}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/SillanpaaVV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/Stubbings05, author = {Michael Stubbings}, title = {The use of Balanced Scorecards for Information Security}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {345--354}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/Stubbings05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/TryfonasMST05, author = {Theodore Tryfonas and Vivienne Mee and Iain Sutherland and Paula Thomas}, title = {Distribution of Offensive Material Over Computer Networks: {A} Research Agenda}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {355--362}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/TryfonasMST05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/Valli05, author = {Craig Valli}, title = {Issues Relating to the Forensics Analysis of {PDA} and Telephony {(PDAT)} Enabled Devices}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {363--368}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/Valli05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/VidalisJ05, author = {Stilianos Vidalis and Andrew Jones}, title = {Analyzing Threat Agents and Their Attributes}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {369--380}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/VidalisJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/Voipio05, author = {Mikko Voipio}, title = {Mail Stream Analysis Using Self-Organizing Map}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {381--390}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/Voipio05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/Webb05, author = {Ken Webb}, title = {Is There a Need for Enhancing National Security Against Terrorists Conducting Information Warfare? {A} Confident Performance for Australia Context}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {391--400}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/Webb05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/Williams05, author = {Patricia A. H. Williams}, title = {Where are the Policies for {PDA} Usage in the Australian Healthcare Environment?}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {401--408}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/Williams05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/WilsdonS05, author = {Tom Wilsdon and Jill Slay}, title = {Towards {A} Validation Framework for Forensic Computing Tools in Australia}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {409--414}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/WilsdonS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/Zakaria05, author = {Omar Zakaria}, title = {Information Security Culture and Leadership}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {415}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/Zakaria05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eciw/2005, title = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Thu, 23 Jun 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.