ICIW 2013 Home
   Call for Papers
   Submission Info
   Abstract Submission
   Proof Reading
   Committee
   Abstracts Selected
   Programme
   Registration
   Practical Information
   Proceedings 2012
   ICIW Past & Future
   Seminars
   Advertisers
   Exhibitors
   Publishers
   Sponsors
   About ACI
   Academic Bookshop
  ICIW 2013
  25-26 March, Denver, Colorado, USA
  Home >> iciw >> ICIW 2013 >> iciw12-proceedings
WWW ACI   At a glance Calendar RSS Feed Contact us

 

 

Proceedings of ICIW 2012
The 7th International Conference on Information-Warfare & Security
held at University of Washington
Seattle
, Washington, USA

22-23 March 2012

 





 

 

The proceedings from ICIW 2012 are now available to purchase in two formats, CD-ROM or Book:

CD
Version

Print
Version

Read the
Abstracts

 

£50 plus postage and packing

 

 

£60.00 plus postage and packing

 


click the icon

 

The Contents of the Proceedings are shown below. To order the Proceedings, please visit the bookshop

 

 

Paper Title

Author(s)

Page No.

Preface

 

iv

Biographies of Conference Chairs, Programme Chair, Keynote Speaker and Mini-track Chairs

 

vii

Biographies of contributing authors

 

ix

Detecting Hidden Logic Bombs in Critical Infrastructure Software

Hira Agrawal, James Alberi, Lisa Bahler, Josephine Micallef, Alexandr Virodov, Mark Magenheimer, Shane Snyder, Vidroha Debroy and Eric Wong

1

The Development of IO / IW Curriculums in the United States: A Review of Current Efforts and a Case Study From Norwich University

Edwin Leigh Armistead

12

Establishing Cyberspace Sovereignty

Kris Barcomb, Dennis Krill, Robert Mills and Michael Saville

19

Study of the Perception of Cyber Threats and the Fear of Cybercrime

Igor Bernik and Gorazd Mesko

27

Effectively Teaching Cyber Warfare to a Non-Technical Audience

David Bibighaus, David Gibson, Martin Carlisle, David Merritt, Jeff Boleng and James Maher

36

Decision-Making by Effective C2I System

Martin Blaha and Kateřina Brabcová

44

Virtual NonState Actors as Clausewitzian Centers of Gravity: An Examination for Sensemaking, Elaboration and Discussion

Larisa Breton

51

BioONT: Improving Knowledge Organization and Representation in the Domain of Biometric Authentication

Stephen Buerle

56

Fairness of Trust Based Mobile ad hoc Network Protocols

Ivan Daniel Burke and Martin Olivier

67

Attribution of Drive-by Downloads Involved in Osama’s Death Malware Campaign

Manoj Cherukuri and Srinivas Mukkamala

82

SCADA Systems in South Africa and Their Vulnerabilities

Grace Chileshe and Renier van Heerden

90

Cyber Security Awareness Initiatives in South Africa: A Synergy Approach

Zama Dlamini and Mapule Modise

98

Comparing Models of Offensive Cyber Operations

Tim Grant Ivan Burke and Renier van Heerden

108

Protecting Health Information Privacy and Safety on the Internet: United States eHealth Systems and Legal Perspectives

Virginia Greiman, Tanya Zlateva, and Lou Chitkushev

122

Security Preprocessor for Industrial Control Networks

Jeffrey Hieb, James Graham, Jacob Schreiver and Kyle Moss

130

The Influence of Cyber Security Levels of South African Citizens on National Security

Joey Jansen van Vuuren, Marthie Grobler and Jannie Zaaiman

138

A Targeted Wireless Denial of Service Attack: Deauth or not to Deauth, That is the Question

Michael Kraft and Jonathan Holston

148

A Novel Friendly Image-Based CAPTCHA With Auto-Generation of Test Data

Chun-Jung Lee, Wei-Bin Lee, Chin-Sheng Liu, Kevin Ho and Chyi-Ren Dow

158

Using Attack Trees to Assess Security Controls for Supervisory Control and Data Acquisition Systems (SCADA)

Juan Lopez Jr., Jason Nielsen, Jeffrey Hemmes and Jeffrey Humphries

166

Measures to Abate Evil Twin Attacks in 802.11

Sayonnha Mandal and Nagadivya Veldanda

178

Securing America Against Cyber war

Jayson McCune and Dwight Haworth

185

Examining Trade Offs for Hardware-Based Intellectual Property Protection

Jeffrey Todd McDonald and Yong Kim

192

An Approach for Cross-Domain Intrusion Detection

Thuy Nguyen, Mark Gondree, Jean Khosalim, David Shifflett, Timothy Levin and Cynthia Irvine

203

Perceptions Towards eBanking Security: An Empirical Investigation of a Developing Country`s Banking Sector, how Secure is eBanking?

Bongani Ngwenya

213

Implementation of Symmetric Block Ciphers Using GPGPU

Naoki Nishikawa, Keisuke Iwai and Takakazu Kurokawa

222

Trolling Online for Real World Identities

Christopher Perr, Daniel Compton and John Hamilton

233

From Traditional Local to Global Cyberspace – Slovenian Perspectives on Information Warfare

Kaja Prislan and Igor Bernik

237

Convergence of Electronic Warfare and Computer Network Exploitation/Attacks Within the Radio Frequency Spectrum

David Rohret and Abiud Jimenez

245

Supply Chain Attacks: Basic Input Output Systems (BIOS), Mux Multiplexers and Field Programmable Gate Arrays (FPGA)

David Rohret and Justin Willmann

254

Attribution: Accountability in Cyber Incidents

Daniel Ryan and Julie Ryan

265

A Game Theoretic Model of Strategic Conflict in Cyberspace

Harrison Schramm, David Alderson, Matthew Carlyle and Nedialko Dimitrov

272

Visualization in Information Security

Dino Schweitzer and Steven Fulton

288

A Novel Biometric System Based on Tongueprint Images

Mohammad Reza Shahriari, Shirin Manafi and Sepehr Sadeghian

297

Intelligence and Influence Potential in Virtual Worlds

George Stein

304

Classifying Network Attack Scenarios Using an Ontology

Renier Pelser van Heerden, Barry Irwin and Ivan Burke

311

A Practical Method for Minimization of Attack Surfaces in Information Warfare

Charles Wilson and Bradley Wilkerson

325

Simulated e-Bomb Effects on Electronically Equipped Targets

Enes Yurtoğlu

330

PhD Papers

 

349

Cyberpower: Learning From the Rich, Historical Experience of War

Ernest Lincoln Bonner

351

Reducing False Positives in an Anomaly-Based NIDS

Saeide Hatamikhah and Mohammad Laali

358

An Ontological Approach to Information Security Management

Teresa Pereira and Henrique Santos

368

Non Academic paper

 

377

The Crawl, Walk, run Progression for Strategic Communication

Christopher Paul

379

Work In Progress papers

 

387

Cyber Fratricide: A Literature Review

Norah Abokhodair and Aaron Alva

389

Behavioral-Based Method for Detecting SCADA Malware

Henry Bushey, Juan Lopez and Jonathan Butts

392

Modelling Organizational Management by Strengthening the Information Protection Requirements in Innovative Organizations

Marcela Izabela Ciopa Stiuca and Cristian Silviu Banacu

395

Evaluation of Traditional Security Solutions in the SCADA Environment

Robert Larkin, Juan Lopez and Jonathan Butts

399

Hackers at the State Service: Cyberwars Against Estonia and Georgia

Volodymyr Lysenko and Barbara Endicott-Popovsky

404

 

 

 

 

Last updated 23 March 2012

 

 

 

 

 

 

 

 

Academic Conferences and Publishing Internatinal Limited - Curtis Farm, Kidmore End, Nr Reading, RG4 9AY, England - Tel: +44 (0)1189 724148 - Fax: +44 (0)1189 724691
eMail: info@academic-conferences.org- Copyright 2012 Academic Conferences and Publishing International Limited - registered in England - No: 06233418 - VAT No: 141 0393 52