Volume 5, Issue 1 Editorial
May 2006
Volume 5 starts with a special series on the network security topic of digital security. There are three special papers on this topic. Valli examines the ability of malicious attackers to control machines remotely, Bhuyan examines how honeypots can be use to identify botnets, whilst Yek examines the use of fingerprinting by honeypots.
The general papers section starts with Dike-Anyiam and Q. Rehmani issues surrounding the adoption of biometric measurement for authentication. Next Pye and Warren look at protecting Australia’s critical infrastructure. Finally, Kuokkanen examines the mathematical basis for anticipatory decision-making in Information Warfare and Security situations.
We hope you enjoy this first issue for 2006. The editor would like to apologize for the delay in this issue. There were a number of factors causing this but we hope you find it all worthwhile. We are trying to ensure that this does not happen with the August issue.
Bill Hutchinson
Email: w.hutchinson@ecu.edu.au
AUTHORS
Published In
Keywords
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive