3rd European Conference On Information Warfare And Security

E-Book Overview

Royal Holloway, University of London, UK. 28-29 June 2004.
Ваш покорный слуга принимал в ней участие с двумя докладами. Правда произошёл анекдотичный случай: барышня, которая верстала материалы трудов конференции, назвала меня Давидом А. Мельниковым, вместо Дмитрия А. Мельникова. Я на англичан не обиделся, а от души посмеялся. Людям свойственно ошибаться. Всем моим коллегам и специалистам в области информационной безопасности и компьютерного шпионажа (информационной войны).

E-Book Content

3rd European Conference on Information Warfare and Security Royal Holloway, University of London, UK 28-29 June 2004 Edited by Andy Jones University of Glamorgan, UK and Dan Remenyi Trinity College Dublin, Ireland Copyright The Authors, 2004. All Rights Reserved. No reproduction, copy or transmission may be made without written permission from the individual authors. Papers have been double-blind peer reviewed before final submission to the conference Initially, paper abstracts were read and selected by the conference panel for submission as possible papers for the conference Many thanks to the reviewers who helped review the quality of the full papers. ISBN: 0-9547096-2-4 Typeset by Academic Conferences Limited Reading UK 44-118-9-724-1418 [email protected] ECIW 2004 Contents Paper Title Author(s) Proceedings Page Preface vi Biographies of contributing authors ix Analysis and Detection of Cruising Computer Viruses Abiola Abimbola, J M Munoz and William J Buchanan School of Computing, Napier University, UK. 1 Enabling Network-centric Warfare by Securing the Core Infrastructure Pauli Aho, Lab. for theoretical computer science Helsinki University of Technology, Finland Catharina Candolin, National Defence College, The Finnish Defence Forces, Helsinki, Finland 9 Information Warfare Action Plans for e-Business Richard Baskerville Georgia State University, Atlanta, USA 15 A Model for Detecting Malicious Groups Sviatoslav Braynov Department of Computer Science, University of Illinois at Springfield, USA 21 Covert Channel Analysis and Detection with Reverse Proxy Servers using Microsoft Windows William J Buchanan and David Llamas School of Computing, Napier University, Edinburgh, Scotland, UK 31 Cyberterrorism: Academic Perspectives Maura Conway School of International Relations, University of St. Andrews, Scotland, UK 41 Towards a Real-time Solution to the Security Threats Posed by Authorised Insiders Clara Corzo and Ning Zhang Department of Computer Science, University of Manchester, UK 51 Information Warfare and Human Rights Law Geoffrey Darnton Institute of Business and Law, Bournemouth University, Poole, UK 61 Factors Affecting the Adoption of IT Risk Analysis Vassilis Dimopoulos, Steven Furnell, Ian Barlow and Benn Lines Network Research Group, University of Plymouth, UK. 71 PIFF: Personnel Identification Friend or Foe Kevin M. Gleason Mount Ida College, Newton Centre, USA 81 i Paper Title Author(s) Proceedings Page The Last Mile: Applying Traditional Methods for Perpetrator Identification in Forensic Computing Investigations Mathew Hannan and Paul Turner School of Information Systems, University of South Australia, Australia 89 The Implications of Hardware Encryption Devices on Forensic Computing Investigations Mathew Hannan and Tom Wil
You might also like

Life, The Science Of Biology
Authors: William K. Purves , David Sadava , Gordon H. Orians , H. Craig Heller    197    0


Encyclopedia Of Physical Science And Technology - Front Matter
Authors: Robert A. Meyers (Editor-in-Chief)    171    0


Science And Scientists
Authors: Salem Press    145    0


The Materials Science Of Thin Films
Authors: Milton Ohring    117    0