Volume 5, Issue 1 Editorial

Stylized Image of the Word Editorial

May 2006

Volume 5 starts with a special series on the network security topic of digital security. There are three special papers on this topic. Valli examines the ability of malicious attackers to control machines remotely, Bhuyan examines how honeypots can be use to identify botnets, whilst Yek examines the use of fingerprinting by honeypots.

The general papers section starts with Dike-Anyiam and Q. Rehmani issues surrounding the adoption of biometric measurement for authentication. Next Pye and Warren look at protecting Australia’s critical infrastructure. Finally, Kuokkanen examines the mathematical basis for anticipatory decision-making in Information Warfare and Security situations.

We hope you enjoy this first issue for 2006. The editor would like to apologize for the delay in this issue. There were a number of factors causing this but we hope you find it all worthwhile. We are trying to ensure that this does not happen with the August issue.

Bill Hutchinson
Email: w.hutchinson@ecu.edu.au


AUTHORS

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com