ICIW2007- 2nd International Conference on Information Warfare & Security: ICIW2007Leigh Armistead Academic Conferences Limited, 2007 - 270 pagina's |
Inhoudsopgave
ArmisteadMurphypdf | 1 |
Braynovpdf | 9 |
ByrantAGrimailapdf | 17 |
BryantGrimailapdf | 25 |
Cullumpdf | 33 |
EdgeRainespdf | 47 |
FaberLundypdf | 57 |
FortsonGrimaliapdf | 69 |
MahoneySousanpdf | 147 |
MauleGalluppdf | 155 |
MottWilliamspdf | 163 |
RevettZiaet alpdf | 171 |
Rowepdf | 177 |
RoweGohpdf | 185 |
SainsburyBaskervillepdf | 195 |
SasakiIwaiKurokawa2pdf | 205 |
Garfinkelpdf | 77 |
GeersEisenpdf | 85 |
Hopdf | 95 |
HyacintheAngladepdf | 101 |
Isaacspdf | 111 |
IwaiSasakiKurokawapdf | 117 |
KamelEramoSutterpdf | 123 |
KuusistoKuusistopdf | 133 |
LachowMiller2pdf | 141 |
SmithWooleyMillspdf | 217 |
SulaimanMandadaMukkamalapdf | 225 |
VidalisLlewellynTubbpdf | 233 |
WalensteinChouchaneLakhotiapdf | 241 |
Webbpdf | 249 |
WoodcockStapletongraypdf | 257 |
XMilneMcCarthyBenjamin et alpdf | 263 |
Veelvoorkomende woorden en zinsdelen
Air Force algorithm applications attack graph attack tree bytes CAULDRON communications cost countermeasures cyber cyberspace data mining database deception Defense DNS servers DNS traffic domain effective environment example executing exploit Figure FPGA function GeoBase goals Handel-C honeypot identify impact implemented information assets information flows Information Operations information security information systems information terrorism Information Warfare infrastructure INOC-DBA input Internet intrusion detection IP address IPv6 malicious malware manipulation memory metamorphic metamorphic malware methods metrics microfluidics military mission MRSL Naval Postgraduate School nodes operating system organization packets password performance problem instance processor profiles protection tree protocol risk analysis risk analysis engine risk management scenario Side Channel Attack SME's strategic target techniques terrorist text mining threat transformations VMware vulnerabilities