ICIW 2013 Home
   ICIW 2012 Home
   Practical Information
   Proceedings 2012
   ICIW Past & Future
   About ACI
   Academic Bookshop
ICIW 2012
22-23 March, Seattle, USA
Home >> ICIW >> ICIW 2012 >> iciw12-timetable
WWW ACI   At a glance Calendar RSS Feed Contact us






The conference programme for the conference is given below. A .pdf version of this programme can be downloaded from the participant section at the top of the At a Glance web-page

This timetable is subject to change and presentation times can change. If you are not going to be present for the full conference please email sue@academic-conferences.org with your schedule and we will do our best to accommodate you.




Wednesday 21 March 2012


Hotel Deca Bar
Pre-conference registration and welcome meeting (Until 1930)

Thursday 22 March 2012


Registration and coffee


Room: 102
Welcome from the conference chair: Dr. Barbara Endicott-Popovsky, Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA


Keynote address: Kirk Bailey, CISO, University of Washington


Conference splits into streams


Room: 022
Stream A: Cyber Security
Chair: Ginny Greiman

Room: 026
Stream B: Attacks
Chair: Larisa Breton

Room: 111
Stream C: I-Warfare
Chairs: Leigh Armistead

Room: 175
Stream D: Mini Track on Critical Infrastructure Protection
Chair: Juan Lopez Jr.


The Influence of Cyber Security Levels of South African Citizens on National Security
Jansen van Vuuren Joey, Marthie Grobler Council of Scientific and Industrial Research and Jannie Zaaiman, University of Venda, South Africa

Supply Chain Attacks:  Basic Input Output Systems (BIOS), Mux Multiplexers, and Field Programmable Gate Arrays (FPGA)
Rohret David, and Justin Willmann,  Joint Information Operatons Warfare Center (JIOWC) Vulnerability Assessment Team (JVAT), USA

A Game Theoretic Model of Strategic Conflict in Cyberspace
Schramm Harrison, David Alderson, Nedialko Dimitrov and Carlyle W. Matt, Naval Postgraduate School, Monerey, CA, USA

Securing America Against Cyberwar
McCun Jayson, Dwight Haworth  University of Nebraska at Omaha, USA


Study of the Perception of Cyber Threats and the Fear of Cybercrime
Bernik Igor and Gorazd Mesko, University of Maribor, Slovenia

Simulated E-Bomb Effects On Electronically Equipped Targets
Yurtoglu Enes, Turkish Air Force War College, Turkey

Decision-Making by Effective C2I system
Blaha Martin and Katerina Brabcova University of Defence, Czech Republic

Security Preprocessor for Industrial Control Networks
Hieb Jeffrey, Graham James, Jacob Schreiver and Kyle Moss, University of Louisville, USA


SCADA Systems in South Africa and Their Vulnerabilities
Chileshe Grace and Renier van Heerden, University of Pretoria, South Africa

Measures To Abate Evil Twin Attacks in 802.11
Mandal Sayonnha and Nagadivya Veldanda, University of Oklahoma, USA

From Traditional Local to Global Cyberspace – Slovenian Perspectives on Information Warfare
Bernik Igor and Kaja Prislan, University of Maribor, Slovenia

"Using Attack Trees to Assess the Security of SCADA systems"
Lopez Jr. Juan, Jeffrey Hemmes, Jeffrey Humphries, Air Force Institute of Technology, Dayton, OH and Jason Nielsen, Airforce Intelligence Surveillance and Reconnaissance Agency, San Antonio, TX, USA (academic, CIP)IW-071


Cyber Security Awareness Initiatives in South Africa: A Synergy-Approach
Dlamini Innocentia Zama and Mapule M Modise, CSIR, South Africa

Implementation of Symmetric Block Ciphers using GPGPU
Nishikawa Naoki , Keisuke Iwai  and Takakazu Kurokawa, National Defense Academy, Japan

Comparing Models of Offensive Cyber Operations
Grant Tim, Netherlands Defence Academy, Netherlands, Ivan Burke and Renier Van Heerden, Council for Scientific and Industrial Research, South Africa

Detecting Hidden Logic Bombs in Critical Infrastructure Software
Agrawal Hira, James Alberi, Lisa Bahler, Josephine Micallef, and Alexandr Virodov, Telcordia Technologies, NJ, Mark Magenheimer and Shane Snyder US Army CERDEC, MD, Vidroha Debroy and  Eric Wong The University of Texas at Dallas,  TX, USA







Room: 022

Stream A: Cyber Security

Chair: Jannie Zaaiman

Room: 026

Stream B: Mini Track on The Legal Context/Dimension for IW

Chair: Dan Ryan

Room: 111

Stream C: Authentication and Identification

Chair: Jeffrey McDonald

Room: 175

Stream D: Strategy and NIDs

Chair: Dino Schweitzer


Protecting Health Information Privacy and Safety on the Internet:  eHealth Systems and Legal Perspectives
Greiman Virginia, Tanya Zlateve and Lou Chitkushev, Boston University, USA

Establishing Cyberspace Sovereignty
Barcomb Kris, Robert Mills, Dennis Krill and Michael Saville, Air Force Institute of Technology, USA

A Novel Friendly Image-Based CAPTCHA with Auto-Generation of Test Data

Chun-Jung Lee, Wei-Bin Lee, Chin-Sheng Liu, Chyi-Ren Dow, Feng Chia University, Kevin Ho, Providence University and Tsung-Hung Lin, National Chin-Yi University of Technology, Taiwan (R.O.C.)

The Crawl, Walk, Run Progression for Strategic Communication
Paul Christopher, RAND Corp., USA


Convergence of Electronic Warfare and Computer Network Exploitation/Attacks within the Radio Frequency Spectrum
Rohret David and Abiud Jimenez, Joint Information Operations Warfare Center (JIOWC) Assessment Vulnerabiity Team (JVAT), USA

Attribution: Digital Forensics on the Cyber Battlefield
Ryan Daniel and Julie Ryan, George Washington University, USA

Trolling Online for Real World Identities
Perr Christopher, Daniel Compton and John Hamilton, Auburn University, USA

The Islamic Republic of Iran Strategy’s against Soft Warfare
Anoosheh Ebrahim, Islamic Azad university, Rafsanjan branch , Iran


Cyberpower: Learning from the Rich, Historical Experience of War
Bonner Ernest, Air University, USA

A Progress Report on the IW Ops Manual
Tikk Ringas, Eneken , Toronto University Munk School of International Affairs, Canada (presentation only)

A Novel Biometric System Based on Tongueprint Images
Shahriari Mohammad Reza Islamic Azad University, UAE Branch, Dubai,  Shirin Manafi Islamic Azad University, Tehren, Azad University and Sepehr Sadeghian, IRAN University of Science & Technology, Iran

Reducing False Positives in Anomaly-Based NIDS
Hatamikhah Saeide and Mohammad Laali, Tarbiat Moallem University, Tehran, Iran







Room: 175
Panel Discussion to be led by Leigh Armistead
Information warfare, collateral damage, and the issue of scale”
Panellists include Michael Hamilton, CISO of the City of Seattle


Close of conference day

Close of conference day

Close of conference day

Close of conference day


Conference Dinner at Ivar’s Salmon House




Friday 23 March 2012


Room: 102
Keynote address: Dr Eneken Tikk Ringas, Toronto University Munk School of International Affairs, Canada
"Rules of the Road" for a Polarized Cyberspace - A View on Current International Cyber Law and Policy Priorities


Introduction to ICIW 2013 in Denver by Dan Likarish


Poster contributors will stand by their posters for participants to discuss their research

Poster contributors will stand by their posters for participants to discuss their research

Poster contributors will stand by their posters for participants to discuss their research

Poster contributors will stand by their posters for participants to discuss their research


Room: 022
Stream A: Denial of Service and Network Attacks
Chair: Robert Mills

Room: 026
Stream B: Mini Track on Asymmetric Warfare in Cyberspace – Prospects and Potentials
Co-Chairs: Dan Shoemaker and Ronald C. Dodge

Room: 111
Stream C: Mini Track Call for Papers on Information Assurance
Chair: Natarajan Vijayarangan

Room: 175
Stream D:ICT Security and Network protocols
Chair: Dwight Haworth


A Targeted Wireless Denial of Service Attack: Deauth or not to Deauth, that is the Question
Kraft Michael and Jonathon Holston, JIOWC, TX, USA

Intelligence and Influence Potential in Virtual Worlds
Stein George, USAF Center for Strategy & Technology, USA

A Ontological Approach in Information Security
Pereira Teresa, ESCE/IPVC and Henrique Santos, University of Minho, Portugal

ICT Security in the Modern Airport: Can Organic Growth Ever be Secure?
McCarthy John, Don Milne, Bucks New University and Bryan Mills Servicetech England, UK (Presentation only)


Classifying Network Attack Scenarios Using an Ontology
Van Heerden Renier Pelser, CSIR, Pretoria, Ivan Burke and Barry Irwin, Rhodes University, South Africa

Virtual NonState Actors as Clausewitzian Centers of Gravity: An Examination for Sensemaking, Elaboration and Discussion
Breton Larisa, University of the District of Columbia, USA

Visualization in Information Security
Schweitzer Dino, USAF Academy, USA and Steve Fulton, USAF Academy, USA

Fairness of Trust Based Mobile ad hoc Network Protocols
Burke Ivan, CSIR and Martin Olivier, University of Pretoria, South Africa


An Approach for Cross-Domain Intrusion Detection
Nguyen Thuy, Mark Gondree, Jean Khosalm, David Shifflett, Timothy Levin and Cynthia Irvine Naval Postgraduate School, USA

A Practical Method for Minimization of Attack Surfaces in Information Warfare
Wilson Charles,  University of Detroit Mercy and Bradley Wilkerson, Eastern Michigan University, USA

BioONT: Improving Knowledge Organization and Representation in the Domain of Biometric Authentication
Buerle Stephen, State University of New York at Albaney, USA,

Perceptions Towards e-Banking Security: An Empirical Investigation of a Developing Country`s Banking Sector, How Secure is e-Banking?
Ngwenya Bongani, Solusi University, Zimbabwe







Room: 175
Plenary presentation: Voldymyr Lysenko, Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA
The role of ICT in the Arab Spring


Room: 022
Stream A: Software Issues
Chair: Harrison Schramm

Room: 026
Stream B:  Security Teaching and Awareness

Room: 111
Stream C: Mini Track Call for Papers on Information Assurance
Chair: Natarajan Vijayarangan



Examining Tradeoffs for Hardware-Based Intellectual Property Protection
McDonald Jeffrey, University of South Alabama and Yong Kim, Air Force Insitute of Technology, USA

The Development of IO / IW Curriculums in the United States: A Review of Current Efforts and a Case Study from Norwich University
Armistead Leigh, Edith Cowan University, Perth, Australia

Designing & Implementation of Certificate-less PKI Using Open Source Tools
Vijayarangan Natarajan, Tata Consultancy, India (073)



Attribution of Drive-by Downloads involved in Osama’s death Malware Campaign
Cherukuri Manoj and Srinivas Mukkamala, New Mexico Institute of Mining and Technology, USA

Effectively Teaching Cyber Warfare to a Non-Technical Audience
Bibighaus David, David Gibson, Martin Carlisle David Merritt, Jeff Boleng and James Maher, United States Air Force Academy, USA

Message pre-proceesing methods for preventing and detecting hash collisions
Vijayarangan Natarajan, Tata Consultancy, India (076)



Room: 175
A summary of issues raised during the conference
Led by Voldymyr Lysenko and Barbara Endicott-Popovsky
Prize for the best poster will be awarded


Close of Conference

Close of Conference

Close of Conference

Close of Conference


Work in Progress and Posters


Modeling Organizational Management by Adapting to the Strengthening of the Information's Protection Requirements in the Innovative Organization
Ciopa Stiuca Marcela Izabela and Cristian Silviu Banacu, The Academy of Economic Sciences, Romania

Hackers at the State Service: Cyberwars Against Estonia and Georgia
Lysenko Volodymyr and Barbara Endicott-Popovsky, University of Washington, Seattle, USA

Cyber Fratricide: A Literature Review of
Abokhodair Norah, Aaron Alva, University of Washington, Seattle, USA



Evaluation of Traditional Security Solutions in the SCADA Environment
Larkin Robert, Jonathan Butts , and Juan Lopez, AFIT, USA

Behavioral-Based Method for Detecting SCADA Malware
Bushey Henry,  Jonathan Butts, and Juan Lopez, AFIT, USA

An Infinite Dimensional Mathematical Flag for Defense Applications
Vijayarangan Avinash, BVM Global School at Bollineni Hillside, India (poster only)





Publication opportunity

Papers presented at the conference will be published in the conference proceedings, subject to author registration and payment. Selected papers presented at the Conference will be considered for publication in a special issue of the Journal of Information Warfare: http://www.jinfowar.com

Purchase previous conference proceedings  Proceedings for previous ICIW conferences can be purchased from our bookshop by clicking on the link.











Last updated 21 March 2012









Academic Conferences Limited - Curtis Farm, Kidmore End, Nr Reading, RG4 9AY, England - Tel: +44 (0)1189 724148 - Fax: +44 (0)1189 724691
eMail: info@academic-conferences.org- Copyright 2003-2012 Academic Conferences Limited - registered in England - No: 4719488 - VAT No: 812 5386 38
Terms & Conditions                                             Privacy Policy