ICIW 2011 Home
   Author Guidelines
   Call for Papers
   Abstract Submission
   Abstracts Selected
   Practical Information
   Proceedings 2010
   ICIW Future
   ICIW Past
   Exhibitor Details
   Sponsorship Details
   About ACI
ICIW 2011
17-18 March, Washington, DC, USA
Home >> ICIW >> ICIW 2011 >> iciw10-proceedings
WWW ACI   At a glance Calendar RSS Feed Contact us


Proceedings of ICIW 2010
The 5th International Conference on Information-Warfare & Security
held at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA
Wright-Patterson Air Force Base, Ohio, USA
8-9 April 2010



The proceedings of the above conference are now available to purchase in two formats, Book or CD-ROM:

UK AND EUROPE: Cost, including post and packing is £60.00

REST OF THE WORLD: Cost, including post and packing is £65.00

Cost for CD is £50, including post and packing, to UK and  Europe and £55 to anywhere else in the world.

The Contents of the Proceedings are shown below.

If you would like to download and read the Abstracts of the papers presented at the Conference, please click here

To order the Proceedings, please click here



Paper Title


Page No.




Biographies of Conference Chairs, Programme Chair, Keynote Speaker and Mini-track Chairs



Biographies of contributing authors



Mission Impact: Role of Protection of Information Systems

Evan Anderson1, Joobin Choobineh1, Michael Fazen1, and Michael Grimaila2
Texas A&M University, College Station, USA
2Air Force Institute of Technology, Wright Patterson AFB, USA


Operational art and Strategy in Cyberspace

Sam Arwood, Robert Mills and Richard Raines
Air Force Institute of Technology, Wright-Patterson AFB, USA


BotNet Communication in an Asymmetric Information Warfare Campaign

Curt Barnard and Barry Mullins
Air Force Institute of Technology, Wright-Patterson AFB, USA


Distributed Hierarchical Identity Management: a vision

Uri Blumenthal, Joshua Haines and Gerald O’Leary
MIT Lincoln Laboratory, Lexington, USA


Expanding Cyberspace Education and Training

Jeff Boleng and Michael Henson
US Air Force Academy, Colorado, USA


Investigation of Network Security Risks Inherent to IPv6

Julie Boxwell Ard
University of California, Davis, USA


Civilians in Information Warfare: Conscription of Telecom Networks and State Responsibility for International Cyber Defense

Susan Brenner1 and Maeve Dion2
University of Dayton School of Law, USA
2George Mason University School of Law, USA


Covert Channels in the HTTP Network Protocol: Channel Characterization and Detecting Man-in-the-Middle Attacks

Erik Brown, Bo Yuan, Daryl Johnson and Peter Lutz
Rochester Institute of Technology, Rochester, USA


Framework for Developing Realistic MANET Simulations

Ivan Burke1, Shahen Naidoo1 and Martin Olivier2
Council for Scientific and Industrial Research, Pretoria South Africa
2University of Pretoria, South Africa


Real-Time Detection of Distributed Zero-Day Attacks in ad hoc Networks

James Cannady
Nova Southeastern University, Fort Lauderdale, USA


Intelligence Activities in Greece and Rome: Extracting Lessons

Evan Dembskey
Tshwane University of Technology, South Africa


Simple Trust Protocol for Wired and Wireless SCADA Networks

Jose Fadul, Kenneth Hopkinson, Todd Andel, Stuart Kurkowski, James Moore
Air Force Institute of Technology, USA


Security in the Emerging African Broadband Environment

Bryon Fryer, Kris Merritt and Eric Trias
Air Force Institute of Technology (AFIT), Dayton, Ohio, USA


Critical Infrastructure Control Systems Vulnerabilities

Marchello Graddy and Dennis Strouble
Air Force Institute of Technology, Wright-Patterson AFB, USA


Legal Frameworks to Confront Cybercrime: a Global Academic Perspective

Virginia Greiman and Lou Chitkushev
Boston University, MA, USA


Communicating Potential Mission Impact Using Shared Mission Representations

Brian Hale1, Michael Grimaila1, Robert Mills1, Michael Haas1, and Phillip Maynard2
Air Force Institute of Technology, Wright Patterson AFB, USA
2Air Force Research Laboratory, Wright Patterson AFB, USA


Explosion of Connections

Harry Haury
NuParadigm Government Systems, Inc., Saint Louis, MO, USA


Information Asset Value Quantification Expanded

Denzil Hellesen1 and Michael Grimaila2
Air Force Network Integration Center (AFNIC), Scott AFB, USA
2Air Force Institute of Technology, Wright-Patterson AFB, USA


Pearl Harbor 2.0: When Cyber-Acts Lead to the Battlefield

Wayne Henry, Jacob Stange and Eric Trias
Air Force Institute of Technology, WPAFB, USA


Educating and Training Soldiers for Information Operations

Aki-Mauri Huhtinen1, Leigh Armistead2, 3 and Corey Schou3
Finnish National Defence University, Helsinki, Finland
2Goldbelt Hawk LLC, Hampton, USA
3Idaho State University, Pocatello, USA


Improving the Latent Dirichlet Allocation Document Model With WordNet

Laura Isaly, Eric Trias and Gilbert Peterson
Air Force Institute of Technology, Wright-Patterson AFB, USA


The Impact of the Increase in Broadband Access on South African National Security and the Average Citizen

Joey Jansen van Vuuren1, Jackie Phahlamohlaka 1 and Mario Brazzoli2
1Defence Peace Safety and Security: CSIR, Pretoria, South Africa
Government Information Technology Officer in the Defence Secretariat, Pretoria, South Africa


A Collaborative Process Based Risk Analysis for Information Security Management Systems

Bilge Karabacak1 and Sevgi Ozkan2
TUBITAK, Ankara, Turkey
2METU, Ankara, Turkey


Ensuring Communication Security in Delay-Tolerant Networks

Anssi Kärkkäinen
Defence Command Finland, Helsinki, Finland


From ABAC to ZBAC: The Evolution of Access Control Models

Alan Karp1, Harry Haury2 and Michael Davis3
Hewlett-Packard Laboratories, USA
2NuParadigm, USA


Malware Detection via a Graphics Processing Unit

Nicholas Kovach and Barry Mullins
Air Force Institute of Technology, Wright-Patterson AFB, USA


Digital Evidence Collection in Cyber Forensics Using Snort

Thrinadh Praveen Kumar1, Lalitha Bhaskari2, P. Avadhani2 and P. Vijaya Kumar3
GVP College of Engineering, Visakhapatnam, India
2AU College of Engineering, Visakhapatnam, India
3High Court of Andhra Pradesh, Hyderabad, India


Growth Through Uncertainty – the Secure e-Business Evolution of the Small Firm

John McCarthy, Alan Benjamin, Don Milne, Bryan Mills and Peter Wyer
Bucks New University, High Wycombe, UK
Derby University, UK


Hiding Appropriate Messages in the LSB of JPEG Images

Hamdy Morsy1, Ahmed Hussein1, Joshua Gluckman2 and Fathy Amer1
Faculty of Engineering at Helwan University, Cairo, Egypt
2American University in Cairo, Egypt


An Application of Deception in Cyberspace: Operating System Obfuscation

Sherry Murphy, Todd McDonald, and Robert Mills
Air Force Institute of Technology, Wright Patterson, USA


Insider Threat Detection Using Distributed Event Correlation of Web Server Logs

Justin Myers, Michael Grimaila, and Robert Mills
Air Force Institute of Technology, USA


Verify Then Trust: A New Perspective on Preventing Social Engineering

Kristopher Nagy, Brian Hale and Dennis Strouble
Air Force Institute of Technology, Wright-Patterson AFB, Ohio, USA


Cyberspace: Definition and Implications

Rain Ottis and Peeter Lorents
Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia


Transparent Emergency Data Destruction

Warren Roberts, Christopher Johnson and John Hale
University of Tulsa, USA


Cyber-Based Behavioral Fingerprinting

David Robinson and George Cybenko
Dartmouth College, Hanover, USA


Exploitation of Blue Team SATCOM and MILSAT Assets for red Team Covert Exploitation and Back-Channel Communications

David Rohret and Jonathan Holston
Joint Information Operations Warfare Center (JIOWC)/Joint Electronic Warfare Center (JEWC) San Antonio, USA


A Hybrid Approach to Teaching Information Warfare

Dino Schweitzer and Steve Fulton
United States Air Force Academy, USA


A Stochastic Game Model with Imperfect Information in Cyber Security

Sajjan Shiva, Sankardas Roy, Harkeerat Bedi, Dipankar Dasgupta and Qishi Wu
University of Memphis, USA


Malware Antimalware Games

Anshuman Singh, Arun Lakhotia and Andrew Walenstein
University of Louisiana at Lafayette, USA


Evaluating the Security of Enterprise VoIP Networks

Peter Thermos
Palindrome Technologies, USA


An FPGA-Based Malicious DNS Packet Detection Tool

Brennon Thomas and Barry Mullins
Air Force Institute of Technology, Wright-Patterson AFB, USA


Digital Forensics Detection and Disruption of JPEG Steganaography

George Trawick and Drew Hamilton
Auburn University, Auburn Alabama, USA


A High-Level Mapping of Cyberterrorism to the OODA Loop

Namosha Veerasamy
Council for Scientific and Industrial Research (CSIR), Pretoria, South Africa


An Adaptation Based Survivability Framework for Mission Critical Systems

Yanjun Zuo
University of North Dakota, Grand Forks, USA


Research in Progress Papers



A Blind Scheme Watermarking Algorithm for Data Hiding in RGB Images Using GÖdelization Technique Under Spatial Domain

Peri Avadhani and Lalitha Bhaskari
A U College of Engineering (A), Andhra Pradesh, India


Automatic Discovery of Attack Messages and Pre- and Post-Conditions for Attack Graph Generation

Marco Carvalho and Choh Man Teng
Institute for Human and Machine Cognition, Pensacola, USA


Mission Impact of Cyber Events: Scenarios and Ontology to Express the Relationships Between Cyber Assets, Missions and Users

Anita D’Amico1, Laurin Buchanan1, John Goodall1 and Paul Walczak2
Applied Visions, Inc., Secure Decisions Division, Northport, USA
2Warrior, LLC, Arlington, USA


An Investigation of Malware Type Classification

Thomas Dube1, Richard Raines1, Bert Peterson1, Kenneth Bauer1, Steven Rogers2
Air Force Institute of Technology, WPAFB, Ohio, USA

2Air Force Research Laboratory, WPAFB, Ohio, USA


Language-Driven Assurance for Regulatory Compliance of Control Systems

Robin Gandhi, William Mahoney, Ken Dick and Zachary Wilson
University of Nebraska at Omaha, USA


AIMFIRST: Planning for Mission Assurance

Tom Haigh, Steven Harp and Charles Payne
Adventium Enterprises, Minneapolis, USA


Moderating Roles of Organizational Capabilities Affecting Information Security Strategy Effectiveness: A Structural Equation Modeling Analysis

Jacqueline Hall, Shahram Sarkani, and Thomas Mazzuchi
The George Washington University, Washington, USA


Information Operations in Space, Absence of Space Sovereignty, Growing Number of Nations Looking Spaceward: Threats and Fears Concerning Established Space-based Military Powers

Berg Hyacinthe1 and Larry Fleurantin2
Assas School of Law― cersa-cnrs Sorbonne, France
2Fleurantin & Associates, Florida, USA


Evaluating the Impact of Cyber Attacks on Missions

Scott Musman, Aaron Temin, Mike Tanner, Dick Fox and Brian Pridemore
MITRE Corp, McLean, VA, USA


NEO Thinks EBO - a way to Shape Perceptions

Nuno Perry1 and Paulo Nunes1, 2
Competitive Intelligence and Information Warfare Association Club, Funchal, Portugal
2Centro de Investigação da Academia Militar, Lisbon, Portugal


Decision-Making by Effective Information Security Managers

James Pettigrew, Julie Ryan, Kyle Salous and Thomas Mazzuchi
George Washington University, Washington DC, USA


Security Monitoring and Attack Detection in Non-IP Based Systems

Steven Templeton
University of California, Davis, USA


Federating Enterprises Architectures Using Reference Models

Jeffery Wilson, Thomas Mazzuchi, and Shahram Sarkani
The George Washington University, Washington DC, USA


Practitioner Papers



The Weaponry and Strategies of Digital Conflict

Kevin Coleman
Security and Intelligence Center at the Technolytics Institute, USA


Security Assessment Techniques for Software Assurance – a “Virtual Team” Approach

Derek Isaacs
Boecore Inc. Colorado Springs USA


Asymmetrical Warfare: Challenges and Strategies for Countering Botnets

Gunter Ollmann
Damballa Inc, Atlanta, USA


Boundary Management and Integration Framework for a Joint Cyber Defence Capability for Military Forces: Analysis and Synthesis from a Through-Life Capability Management Perspective

Joey Roodt1, René Oosthuizen2 and Jan Jansen van Vuuren1
Defence Peace Safety and Security: CSIR, Pretoria, South Africa
2Monzé Consultants, Pretoria, South Africa


The Extremist Edition of Social Networking: The Inevitable Marriage of Cyber Jihad and Web 2.0

Dondi West and Christina Latham
Booz Allen Hamilton, Hanover, Maryland, USA









Updated 29 July 2010


Academic Conferences Limited - Curtis Farm, Kidmore End, Nr Reading, RG4 9AY, England - Tel: +44 (0)1189 724148 - Fax: +44 (0)1189 724691
eMail: info@academic-conferences.org- Copyright 2010 Academic Conferences Limited - registered in England - No: 4719488 - VAT No: 812 5366 38
Terms & Conditions                                             Privacy Policy