Search dblp for Publications

export results for "stream:streams/conf/eciw:"

 download as .bib file

@inproceedings{DBLP:conf/eciw/Ashenden05,
  author       = {Debi Ashenden},
  title        = {Governance Principles for Sharing Information in the Network Enabled
                  Capability {(NEC)} Environment},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {1--8},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Thu, 23 Jun 2016 15:53:29 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/Ashenden05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/AvourdiadisB05,
  author       = {Nikolaos Avourdiadis and
                  Andrew Blyth},
  title        = {Data Unification and Data Fusion of Intrusion Detection Logs in a
                  Network Centric Environment},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {9--20},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/AvourdiadisB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/BalopoulosDGKKG05,
  author       = {Theodoros Balopoulos and
                  Stelios Dritsas and
                  Lazaros Gymnopoulos and
                  Maria Karyda and
                  Spyros Kokolakis and
                  Stefanos Gritzalis},
  title        = {Incorporating Security Requirements Into the Software Development
                  Process},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {21--28},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eciw/BalopoulosDGKKG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/BaskervilleS05,
  author       = {Richard L. Baskerville and
                  Robert Sainsbury},
  title        = {Securing Against the Possibility of an Improbable Event: Concepts
                  for Managing Predictable Threats and Normal Compromises},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {29--38},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Wed, 30 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eciw/BaskervilleS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/BlundellDSTW05,
  author       = {Barry Blundell and
                  Huang Xiao Dong and
                  Jill Slay and
                  Benjamin P. Turnbull and
                  Tom Wilsdon},
  title        = {Development of a "Zero-Skills" Forensic Laptop Registration and Identification
                  Tool},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {39--46},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/BlundellDSTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/BuchananGSSM05,
  author       = {William J. Buchanan and
                  Jamie Graves and
                  Lionel Saliou and
                  Hussain Al Sebea and
                  Nikos Migas},
  title        = {Agent-based Forensic Investigations with an Integrated Framework},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {47--52},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Tue, 06 Sep 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/BuchananGSSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/BusuttilW05,
  author       = {T. B. Busuttil and
                  Matthew J. Warren},
  title        = {An Approach for Critical Information Infrastructure Protection},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {53--62},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/BusuttilW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/Candolin05,
  author       = {Catharina Candolin},
  title        = {Securing the Infrastructure in Information Operations},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {63--72},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/Candolin05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/Darnton05,
  author       = {Geoffrey Darnton},
  title        = {Content Analysis as a Tool of Information Warfare},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {73--82},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/Darnton05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/Efthymiopoulos05,
  author       = {Marios Panagiotis Efthymiopoulos},
  title        = {Is {NATO} in Need of a Renewed Security Concept?},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {83--90},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/Efthymiopoulos05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/FragkosB05,
  author       = {Grigorios Fragkos and
                  Andrew Blyth},
  title        = {Architecture for Near Real-Time Threat Assessment Using {IDS} Data},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {91--98},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/FragkosB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/FragkosXB05,
  author       = {Grigorios Fragkos and
                  Konstantinos Xynos and
                  Andrew Blyth},
  title        = {The use of Computers Idle-Time and Parallel Processing Over a Network
                  to Perform Password Threat Assessment},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {99--106},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/FragkosXB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/GymnopoulosG05,
  author       = {Lazaros Gymnopoulos and
                  Stefanos Gritzalis},
  title        = {Introducing Ontology-based Security Policy Management in the Grid},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {107--116},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/GymnopoulosG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/HoadB05,
  author       = {Richard Hoad and
                  Andrew Blyth},
  title        = {Electromagnetic {(EM)} Susceptibility of information Systems - The
                  Need for Em Detection},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {117--128},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/HoadB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/HughesW05,
  author       = {Kay Hughes and
                  Simon R. Wiseman},
  title        = {Analysis of Information Security Risks: Policy for Protection Through
                  to Implementation},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {129--140},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/HughesW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/Huhtinen05,
  author       = {Aki{-}Mauri Huhtinen},
  title        = {Pre-emptive Military Action: The Fight for Recipients - War as a Part
                  of Story Society Created by the Media},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {141--150},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/Huhtinen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/Hutchinson05,
  author       = {William Hutchinson},
  title        = {The 'Will' and Information Operations},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {151--156},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/Hutchinson05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/KimsoeunKI05,
  author       = {Lory Kimsoeun and
                  Takakazu Kurokawa and
                  Keisuke Iwai},
  title        = {Finite Field Parallel Multiplier for {FPGA}},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {157--164},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/KimsoeunKI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/Kuokkanen05,
  author       = {Pertti Kuokkanen},
  title        = {Risk Consequence Analysis as a Part of Anticipatory Decision-Making
                  Using a Bayesian Network},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {165--174},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/Kuokkanen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/KuusistoKA05,
  author       = {Rauno Kuusisto and
                  Tuija Kuusisto and
                  Leigh Armistead},
  title        = {Common Operational Picture, Situation Awareness and Information Operations},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {175--186},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/KuusistoKA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/KuusistoKY05,
  author       = {Tuija Kuusisto and
                  Rauno Kuusisto and
                  Terhi Yliniemi},
  title        = {Information Needs of Strategic Level Decision-Makers in Crisis Situations},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {187--194},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/KuusistoKY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/LewelingW05,
  author       = {Tara Leweling and
                  Ron Walters},
  title        = {The Evolution of {US} Military Conceptions of Information Warfare
                  and Information Operations, 1979-2004: An Initial Report},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {195--204},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/LewelingW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/LlamasMA05,
  author       = {David Llamas and
                  Alan Miller and
                  Colin Allison},
  title        = {An Evaluation Framework for the Analysis of Covert Channels in the
                  {TCP/IP} Protocol Suite},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {205--214},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/LlamasMA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/Lubbers05,
  author       = {Eveline Lubbers},
  title        = {The Threat Response Spy Files: {A} Case Study About an Arms Manufacturer,
                  a Private Intelligence Company and Many Infiltrators},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {215--224},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/Lubbers05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/MeeS05,
  author       = {Vivienne Mee and
                  Iain Sutherland},
  title        = {Windows Event Logs and Their Forensic Usefulness},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {225--238},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/MeeS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/MoustakasDR05,
  author       = {Evangelos Moustakas and
                  Penny Duquenoy and
                  C. Ranganathan},
  title        = {Phish or Treat? Understanding the Tactics and Responses to Electronic
                  Identity Theft on the Internet},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {239--248},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/MoustakasDR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/PyeW05,
  author       = {Graeme Pye and
                  Matthew J. Warren},
  title        = {Australian Commercial - Critical Infrastructure Management Protection},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {249--360},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eciw/PyeW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/Rantapelkonen05,
  author       = {Jari Rantapelkonen},
  title        = {Targeting a Warlord - The Challenges of Information Operations in
                  Afghanistan},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {261--270},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/Rantapelkonen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/RazakFB05,
  author       = {Shukor Abd Razak and
                  Steven Furnell and
                  Phillip J. Brooke},
  title        = {A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {271--280},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Mon, 24 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/RazakFB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/ReadB05,
  author       = {Huw Read and
                  Andrew Blyth},
  title        = {Visualisation Techniques: Their Application Within Unified Intrusion
                  Detection Systems Data},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {281--292},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/ReadB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/Rowlingson05,
  author       = {Robert Rowlingson},
  title        = {Inside and out? The Information Security Threat From Insiders},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {293--302},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/Rowlingson05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/SaliouBGM05,
  author       = {Lionel Saliou and
                  William J. Buchanan and
                  Jamie Graves and
                  Jose Munoz},
  title        = {Novel Framework for Automated Security Abstraction, Modelling, Implementation
                  and Verification},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {303--312},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/SaliouBGM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/SalmensuuKV05,
  author       = {Ville Salmensuu and
                  Joakim Koskela and
                  Teemupekka Virtanen},
  title        = {Security in Symbian Smartphones: Threats, Needed Functionalities and
                  Existing Implementations},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {313--324},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/SalmensuuKV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/SchouKA05,
  author       = {Corey D. Schou and
                  Dan Kuehl and
                  Leigh Armistead},
  title        = {Information Operations Education: Lessons Learned from Information
                  Assurance},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {325--334},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/SchouKA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/SillanpaaVV05,
  author       = {Pekka Sillanp{\"{a}}{\"{a}} and
                  Mikko Voipio and
                  Teemupekka Virtanen},
  title        = {Technical Comparison of Domain Keys and Sender {ID}},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {335--344},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/SillanpaaVV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/Stubbings05,
  author       = {Michael Stubbings},
  title        = {The use of Balanced Scorecards for Information Security},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {345--354},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/Stubbings05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/TryfonasMST05,
  author       = {Theodore Tryfonas and
                  Vivienne Mee and
                  Iain Sutherland and
                  Paula Thomas},
  title        = {Distribution of Offensive Material Over Computer Networks: {A} Research
                  Agenda},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {355--362},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/TryfonasMST05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/Valli05,
  author       = {Craig Valli},
  title        = {Issues Relating to the Forensics Analysis of {PDA} and Telephony {(PDAT)}
                  Enabled Devices},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {363--368},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/Valli05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/VidalisJ05,
  author       = {Stilianos Vidalis and
                  Andrew Jones},
  title        = {Analyzing Threat Agents and Their Attributes},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {369--380},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/VidalisJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/Voipio05,
  author       = {Mikko Voipio},
  title        = {Mail Stream Analysis Using Self-Organizing Map},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {381--390},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/Voipio05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/Webb05,
  author       = {Ken Webb},
  title        = {Is There a Need for Enhancing National Security Against Terrorists
                  Conducting Information Warfare? {A} Confident Performance for Australia
                  Context},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {391--400},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/Webb05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/Williams05,
  author       = {Patricia A. H. Williams},
  title        = {Where are the Policies for {PDA} Usage in the Australian Healthcare
                  Environment?},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {401--408},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/Williams05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/WilsdonS05,
  author       = {Tom Wilsdon and
                  Jill Slay},
  title        = {Towards {A} Validation Framework for Forensic Computing Tools in Australia},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {409--414},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/WilsdonS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/Zakaria05,
  author       = {Omar Zakaria},
  title        = {Information Security Culture and Leadership},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {415},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/Zakaria05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eciw/2005,
  title        = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Thu, 23 Jun 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics