Australian Information Warfare and Security Conference

Australian Information Warfare and Security Conference

 

Follow

Submissions from 2015

PDF

Is the internet the main medium of transmitting terrorism?, Hatem El Zein

16th Australian Information Warfare Conference, 2015, Edith Cowan University - conference details, William Hutchinson

PDF

A hybrid feature selection for network intrusion detection systems: Central points, Nour Moustafa and Jill Slay

PDF

The cyber simulation terrain: Towards an open source cyber effects simulation ontology, Kent O'Sullivan and Benjamin Turnbull

Submissions from 2014

PDF

Detecting covert communication channels in raster images, Brian Cusack and Jarrett Chambers

PDF

Prerequisites for creating resources and compositions for cyber defence, Tuija Kuusisto and Rauno Kuusisto

PDF

15th Australian Information Warfare Conference, 2014, Edith Cowan University - conference details, Security Research Institute, Edith Cowan University

PDF

Design requirements for generating deceptive content to protect document repositories, Ben Whitham

Submissions from 2013

PDF

Complementary Feature Level Data Fusion for Biometric Authentication Using Neural Networks, Mark Abernethy and Shri Rai

PDF

Towards detection and control of civilian unmanned aerial vehicles, Matthew Peacock and Michael N. Johnstone

PDF

3D Visual Method of Variant Logic Construction for Random Sequence, Huan Wang and Jeffrey Zheng

PDF

The Influence and Deception of Twitter: The Authenticity of the Narrative and Slacktivism in the Australian Electoral Process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille A. Rahman, and David M. Cook

Submissions from 2012

PDF

Applying Feature Selection to Reduce Variability in Keystroke Dynamics Data for Authentication Systems, Mark Abernethy and Shri Rai

PDF

The Regulation of Space and Cyberspace: One Coin, Two Sides, Brett Biddington

PDF

The Reception, Incorporation and Employment of Informatin Operations by the Australia Defence Force: 1990-2012, Jeff Malone

PDF

Protective Emblems in Cyber Warfare, Iain Sutherland, Konstantinos Xynos, Andrew Jones, and Andrew Blyth

PDF

Exterminating the Cyber Flea: Irregular Warfare Lessons for Cyber Defence, Ben Whitham

Submissions from 2011

PDF

Designing cyber warfare information infrastructure resilience, Semir Daskapan and Jan Van der Berg

PDF

Designing a knowledge distribution simulator, Martin Hill and Graham Fletcher

PDF

Penetration of ZigBee-based wireless sensor networks, Michael N. Johnstone and Jeremy A. Jarvis

Submissions from 2010

PDF

Success of Agile Environment in Complex Projects, Abbass Ghanbary and Julian Day

PDF

International Relations and Cyber Attacks: Official and Unofficial Discourse, Kay Hearn, Patricia A H Williams, and Rachel J. Mahncke

PDF

Influence Operations: Action and Attitude, William Hutchinson

PDF

2D Spatial Distributions for Measures of Random Sequences Using Conjugate Maps, Qingping Li and Jeffrey Zhi J. Zheng

PDF

Wikileaks: The Truth or Not, Ian Rosewall and Matthew J. Warren

PDF

Australian Critical Infrastructure Protection: A case of two tales, Matthew Warren, Graeme Pye, and William Hutchinson

PDF

Information Warfare: Time for a redefinition, Patricia A H Williams

Submissions from 2009

PDF

Tactical Analysis of Attack in Physical and Digital Security Incidents:Towards a Model of Asymmetry, Atif Ahmad

PDF

Safeguarding Australia from Cyber-terrorism:A Proposed Cyber-terrorism SCADA Risk Framework for Industry Adoption, Christopher Beggs and Matthew Warren

PDF

Culture Jamming: From Activism to Hactivism, Kay Hearn, Rachel J. Mahncke, and Patricia A. Williams

PDF

Cyber Influence, William Hutchinson

PDF

Appraising Critical Infrastructure Systems with Visualisation, Graeme Pye and Matthew Warren

PDF

Ascent of Asymmetric Risk in Information Security: An Initial Evaluation., Tobias Ruighaver, Matthew Warren, and Atif Ahmad

PDF

When You Can't See the Forest for the Domains: Why a Two Forest Model Should be Used to Achieve Logical Segregation Between SCADA and Corporate Networks, Andrew Woodward and Brett Turner

Submissions from 2008

PDF

A Holistic SCADA Security Standard for the Australian Context, Christopher Beggs

PDF

Information Sharing: Hackers vs Law Enforcement, David P. Biros, Mark Weiser, Jim Burkman, and Jason Nichols

PDF

Protecting Critical Infrastructure with Games Technology, Adrian Boeing, Martin Masek, and Bill Bailey

PDF

Media, government and manipulation: the cases of the two Gulf Wars, William Hutchinson

PDF

Security Metrics - A Critical Analysis of Current Methods, Manwinder Kaur and Andy Jones

PDF

Visualisation of Critical Infrastructure Failure, W D. Wilde and M J. Warren

Submissions from 2007

PDF

Space as a New Sphere of Future Information Warfare, Martti Lehto

PDF

Virtual Radicalisation: Challenges for Police, Simon O'Rourke

PDF

Critical Infrastructure Systems Modelling: Benchmarking CPNTools, Graeme Pye and Matthew J. Warren

PDF

Managing Analysis, David Shaw

PDF

Commercial Critical Systems and Critical Infrastructure Protection: A Future Research Agenda, Matthew J. Warren and Shona Leitch

Submissions from 2006

PDF

Security risk assessment: Group approach to a consensual outcome, Ben Beard and David J. Brooks

PDF

Mapping the consensual knowledge of security risk management experts, David J. Brooks

PDF

Terrorism as Opiniotainment: Perceptions Warriors and the Public Battlefield, Luke Howie

PDF

Information terrorism: networked influence, W Hutchinson

PDF

The Awareness and Perception of Spyware amongst Home PC Computer Users, M Jaeger and N L. Clarke

PDF

Assessing end-user awareness of social engineering and phishing, A Karakasiliotis,; S M. Furnell; and M Papadaki

PDF

Considerations on Deception Techniques Used in Political and Product Marketing, Carlo Kopp

PDF

A study of the compliance of alarm installations in Perth, Western Australia: Are security alarm systems being installed to Australian Standard AS2201.1 – “systems installed in a client's premises.”, Robert E. McLaughlin and David J. Brooks

PDF

Global Reach: Terrorists and the Internet, Simon O'Rourke

PDF

Conceptual Modelling: Choosing a Critical Infrastructure Modelling Methodology, Graeme Pye and Matthew J. Warren

PDF

Electronic Records Management Criteria and Information Security, A Shaw and David T. Shaw

PDF

Mediated Identification, D T. Shaw

PDF

An Information Operation Model and Classification Scheme, D T. Shaw and S Cikara

PDF

Engineering a Suburban Ad-Hoc Network, Mike Tyson, Ronald D. Pose, Carlo Kopp, Mohammad Rokonuzzaman, and Muhammad Mahmudul Islam

PDF

Tags at War: A Review of the United States Department of Defence RFID Tag Data Standard, Uros Urosevic and Christopher Bolan

PDF

Deception on the network: thinking differently about covert channels, Maarten Van Horenbeeck

PDF

Information Terrorism in the New Security Environment, Ken Webb