Australian Information Warfare and Security Conference
Submissions from 2015
Is the internet the main medium of transmitting terrorism?, Hatem El Zein
16th Australian Information Warfare Conference, 2015, Edith Cowan University - conference details, William Hutchinson
A hybrid feature selection for network intrusion detection systems: Central points, Nour Moustafa and Jill Slay
The cyber simulation terrain: Towards an open source cyber effects simulation ontology, Kent O'Sullivan and Benjamin Turnbull
Submissions from 2014
Detecting covert communication channels in raster images, Brian Cusack and Jarrett Chambers
Prerequisites for creating resources and compositions for cyber defence, Tuija Kuusisto and Rauno Kuusisto
15th Australian Information Warfare Conference, 2014, Edith Cowan University - conference details, Security Research Institute, Edith Cowan University
Design requirements for generating deceptive content to protect document repositories, Ben Whitham
Submissions from 2013
Complementary Feature Level Data Fusion for Biometric Authentication Using Neural Networks, Mark Abernethy and Shri Rai
Towards detection and control of civilian unmanned aerial vehicles, Matthew Peacock and Michael N. Johnstone
3D Visual Method of Variant Logic Construction for Random Sequence, Huan Wang and Jeffrey Zheng
The Influence and Deception of Twitter: The Authenticity of the Narrative and Slacktivism in the Australian Electoral Process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille A. Rahman, and David M. Cook
Submissions from 2012
Applying Feature Selection to Reduce Variability in Keystroke Dynamics Data for Authentication Systems, Mark Abernethy and Shri Rai
The Regulation of Space and Cyberspace: One Coin, Two Sides, Brett Biddington
The Reception, Incorporation and Employment of Informatin Operations by the Australia Defence Force: 1990-2012, Jeff Malone
Protective Emblems in Cyber Warfare, Iain Sutherland, Konstantinos Xynos, Andrew Jones, and Andrew Blyth
Exterminating the Cyber Flea: Irregular Warfare Lessons for Cyber Defence, Ben Whitham
Submissions from 2011
Designing cyber warfare information infrastructure resilience, Semir Daskapan and Jan Van der Berg
Designing a knowledge distribution simulator, Martin Hill and Graham Fletcher
Penetration of ZigBee-based wireless sensor networks, Michael N. Johnstone and Jeremy A. Jarvis
Submissions from 2010
Success of Agile Environment in Complex Projects, Abbass Ghanbary and Julian Day
International Relations and Cyber Attacks: Official and Unofficial Discourse, Kay Hearn, Patricia A H Williams, and Rachel J. Mahncke
Influence Operations: Action and Attitude, William Hutchinson
2D Spatial Distributions for Measures of Random Sequences Using Conjugate Maps, Qingping Li and Jeffrey Zhi J. Zheng
Wikileaks: The Truth or Not, Ian Rosewall and Matthew J. Warren
Australian Critical Infrastructure Protection: A case of two tales, Matthew Warren, Graeme Pye, and William Hutchinson
Information Warfare: Time for a redefinition, Patricia A H Williams
Submissions from 2009
Tactical Analysis of Attack in Physical and Digital Security Incidents:Towards a Model of Asymmetry, Atif Ahmad
Safeguarding Australia from Cyber-terrorism:A Proposed Cyber-terrorism SCADA Risk Framework for Industry Adoption, Christopher Beggs and Matthew Warren
Culture Jamming: From Activism to Hactivism, Kay Hearn, Rachel J. Mahncke, and Patricia A. Williams
Cyber Influence, William Hutchinson
Appraising Critical Infrastructure Systems with Visualisation, Graeme Pye and Matthew Warren
Ascent of Asymmetric Risk in Information Security: An Initial Evaluation., Tobias Ruighaver, Matthew Warren, and Atif Ahmad
When You Can't See the Forest for the Domains: Why a Two Forest Model Should be Used to Achieve Logical Segregation Between SCADA and Corporate Networks, Andrew Woodward and Brett Turner
Submissions from 2008
A Holistic SCADA Security Standard for the Australian Context, Christopher Beggs
Information Sharing: Hackers vs Law Enforcement, David P. Biros, Mark Weiser, Jim Burkman, and Jason Nichols
Protecting Critical Infrastructure with Games Technology, Adrian Boeing, Martin Masek, and Bill Bailey
Media, government and manipulation: the cases of the two Gulf Wars, William Hutchinson
Security Metrics - A Critical Analysis of Current Methods, Manwinder Kaur and Andy Jones
Visualisation of Critical Infrastructure Failure, W D. Wilde and M J. Warren
Submissions from 2007
Space as a New Sphere of Future Information Warfare, Martti Lehto
Virtual Radicalisation: Challenges for Police, Simon O'Rourke
Critical Infrastructure Systems Modelling: Benchmarking CPNTools, Graeme Pye and Matthew J. Warren
Managing Analysis, David Shaw
Commercial Critical Systems and Critical Infrastructure Protection: A Future Research Agenda, Matthew J. Warren and Shona Leitch
Submissions from 2006
Security risk assessment: Group approach to a consensual outcome, Ben Beard and David J. Brooks
Mapping the consensual knowledge of security risk management experts, David J. Brooks
Terrorism as Opiniotainment: Perceptions Warriors and the Public Battlefield, Luke Howie
Information terrorism: networked influence, W Hutchinson
The Awareness and Perception of Spyware amongst Home PC Computer Users, M Jaeger and N L. Clarke
Assessing end-user awareness of social engineering and phishing, A Karakasiliotis,; S M. Furnell; and M Papadaki
Considerations on Deception Techniques Used in Political and Product Marketing, Carlo Kopp
A study of the compliance of alarm installations in Perth, Western Australia: Are security alarm systems being installed to Australian Standard AS2201.1 – “systems installed in a client's premises.”, Robert E. McLaughlin and David J. Brooks
Global Reach: Terrorists and the Internet, Simon O'Rourke
Conceptual Modelling: Choosing a Critical Infrastructure Modelling Methodology, Graeme Pye and Matthew J. Warren
Electronic Records Management Criteria and Information Security, A Shaw and David T. Shaw
Mediated Identification, D T. Shaw
An Information Operation Model and Classification Scheme, D T. Shaw and S Cikara
Engineering a Suburban Ad-Hoc Network, Mike Tyson, Ronald D. Pose, Carlo Kopp, Mohammad Rokonuzzaman, and Muhammad Mahmudul Islam
Tags at War: A Review of the United States Department of Defence RFID Tag Data Standard, Uros Urosevic and Christopher Bolan
Deception on the network: thinking differently about covert channels, Maarten Van Horenbeeck
Information Terrorism in the New Security Environment, Ken Webb