27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Contents<br />

Paper Title Author(s) Page<br />

No.<br />

Preface iii<br />

Biographies of <strong>Conference</strong> Chairs,<br />

Programme Chair, Keynote Speaker and<br />

Mini-track Chairs<br />

Biographies of contributing authors v<br />

Using the Longest Common Substring on<br />

Dynamic Traces of Malware to Automatically<br />

Identify Common Behaviors<br />

Modeling and Justification of the Store and<br />

Forward Protocol: Covert Channel Analysis<br />

The Evolution of Information Assurance (IA)<br />

and Information Operations (IO) Contracts<br />

across the DoD: Growth Opportunities for<br />

<strong>Academic</strong> Research – an Update<br />

The Uses and Limits of Game Theory in<br />

Conceptualizing Cyberwarfare<br />

Jaime Acosta 1<br />

Hind Al Falasi and Liren Zhang 8<br />

Edwin Leigh Armistead and Thomas Murphy 14<br />

Merritt Baer 23<br />

Who Needs a Botnet if you Have Google? Ivan Burke and Renier van Heerden 32<br />

Mission Resilience in Cloud Computing: A<br />

Biologically Inspired Approach<br />

Link Analysis and Link Visualization of<br />

Malicious Websites<br />

The Strategies for Critical Cyber<br />

Infrastructure (CCI) Protection by Enhancing<br />

Software Assurance<br />

Building an Improved Taxonomy for IA<br />

Education Resources in PRISM<br />

Using Dynamic Addressing for a Moving<br />

Target Defense<br />

Changing the Face of Cyber Warfare with<br />

International Cyber Defense Collaboration<br />

Cyber Strategy and the Law of Armed<br />

Conflict<br />

eGovernance and Strategic Information<br />

Warfare – non Military Approach<br />

Intelligence-Driven Computer Network<br />

Defense Informed by Analysis of Adversary<br />

Campaigns and Intrusion Kill Chains<br />

The Hidden Grand Narrative of Western<br />

Military Policy: A Linguistic Analysis of<br />

American Strategic Communication<br />

Host-Based Data Exfiltration Detection via<br />

System Call Sequences<br />

Detection of YASS Using Calibration by<br />

Motion Estimation<br />

Marco Carvalho, Dipankar Dasgupta, Michael<br />

Grimaila and Carlos Perez<br />

Manoj Cherukuri and Srinivas Mukkamala 52<br />

Mecealus Cronkrite, John Szydlik and Joon Park 68<br />

Vincent Garramone, Daniel Likarish 76<br />

Stephen Groat, Matthew Dunlop, Randy Marchany<br />

and Joseph Tront<br />

Marthie Grobler, Joey Jansen van Vuuren and<br />

Jannie Zaaiman,<br />

Ulf Haeussler 99<br />

Karim Hamza and Van Dalen 106<br />

Eric Hutchins, Michael Cloppert and Rohan Amin 113<br />

Saara Jantunen and Aki-Mauri Huhtinen 126<br />

Brian Jewell and Justin Beaver 134<br />

Kesav Kancherla and Srinivas Mukkamala 143<br />

i<br />

iv<br />

42<br />

84<br />

92

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!