5th International Conference on Information Warfare and Security (ICIW 2010)

Venue: The Air Force Institute of Technology,

Location: Ohio, Ohio, United Kingdom

Event Date/Time: Apr 08, 2010 End Date/Time: Apr 09, 2010
Registration Date: Mar 05, 2010
Early Registration Date: Feb 01, 2010
Report as Spam


Call for Papers, Research in Progress, Case Studies, Posters, Round-table discussions, Practitioner Contributions and Product Demonstrations

Information warfare and computer security are at the forefront of modern defence Cyber Strategies. Strong strands of research and interest are developing in the area, including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation in addition to the offensive areas associated with information operations such as perception management and strategic communications. The International Conference on Information Warfare and Security (ICIW) offers an opportunity for academics, practitioners and consultants from the US, North America and elsewhere who are involved in the study, management, development and implementation of systems and concepts related to information warfare or are interested in ways to improve information systems security, to come together and exchange ideas. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.

The advisory group for the conference welcomes both academic and practitioner papers on a wide range of topics and a wide range of scholarly approaches including theoretical and empirical papers employing qualitative, quantitative and critical methods. Research in progress, case studies, poster submissions, proposals for roundtable discussions, practitioner contributions, and product demonstrations based on the main themes are also invited.

Click here to download a .PDF version of this page

Read the
Author Guidelines

Submission details are given below. Topics for submissions may include, but are not limited to:

Human Factors
Principles of i-Warfare

Physical security
Counter-terrorism security policies, procedures and legislation
Information warfare policy

SMEs - Small-to-medium Size Enterprises Security model
Critical national infrastructure protection
Information warfare theory

Security implications of “virtualised machines and services
e-Health systems as part of a national critical infrastructure
Information warfare techniques

The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)
Information security governance and management
Information warfare and security education


Information Assurance
Networked Centric War

Wireless Treats
Reflector attacks

Threat Agents
Art of war

Particle swarm data mining

Risk Management
Virtual Intrusion Detection
Electro-magnetic pulse weapons

Collaborative decision making
National security policy
Information operations

Security policy
Acute situational awareness
Strategic leadership

Aircraft Environment
Influence campaigns

Phishing and spam
Digital forensics
Psychological warfare

Current Anti Virus Technologies
Network anomaly detection models

Mobile Virus
Corporate defence mechanisms
Perception management

RFID Virus
Security for small to medium enterprises
Infra-structure warfare

SQL Infections
Information, computer and network security
Military Culture Topography

Data Loss
Security of the virtual worlds
Modern conflict

Data Integration
SIMAD what can/should be done to protect against this threat?
Military approaches

ISO 27001
Unidirectional linguistic steganography
Compromise path analysis

Gaussian empirical rule
IT auditing and compliance
Defence steganography

Natural computing
Information Security Architecture
Data and service integration

Random numbers approximation sequence
Artificial immune recognition system security infrastructure
Legal issues concerned with information warfare and e-Crime

Traffic classification
Public Key Infrastructure
Non-traditional enemies

Subliminal Channel
Network Address Translator
Ethical, political and social issues relating to information warfare

Machine Learning Risk
Association of Religions with Warfare

Context free grammers

Corporate Defence Mechanisms
Adversarial Learning and planning
Denial of Service

IS027001 ISM3
Anonymous Routing
Differential Power Analysis (DPA)

Petri Nets

Risk analysis and assessment
Vulnerability Assessments
Security Initiative (PSI)

There are no mini tracks as yet for ICIW 2010. If you would be interested in preparing and chairing a mini track, please contact the Conference Director, Sue Nugus outlining your suggested topic.

Paper Submissions

Papers should address the conference topics listed above and can describe a wide range of research including empirical or theoretical studies. In addition, philosophical papers presenting an argument and papers presenting a process that has been developed and is now ready for wider use are welcome. In all cases concepts and underlying principles should be emphasized, with enough background information to orient any reader who is not a specialist in the particular subject area original. The work should not have been published elsewhere and should not be intended to be published elsewhere during the review period.

Research in Progress

Researchers may submit current projects whilst they are still in progress. To be eligible, it is necessary for a paper to be produced to a publishable academic standard and papers will be subject to the same criteria and processes as research papers. However the final results of the research may not have been fully completed and interpreted.

Case Study Submissions

Case study submissions should be written to publishable standards. Case studies will be subject to the same criteria and the processes as research papers.

Poster Submissions

Posters provide an opportunity for researchers to present their work in an informal setting in which there is more time for discussion and questions than is sometimes available in a full paper session. This track is an ideal forum for the presentation of work in progress. Poster submissions are welcomed in any of the areas identified in the call for papers.

Poster submission requirements

An abstract describing the work being presented on the poster should be submitted in accordance with the submission details below. Be sure to select Poster as the submission type.
Poster abstracts will be blind reviewed by a member of the programme committee. Reviewers will be asked to consider the appropriateness of the work for poster presentation.
On acceptance instructions on poster dimensions etc will be supplied.
Poster abstracts and images of the final poster will be published in the CD version of the Conference Proceedings.
At least one person must register for the conference to present the poster.

Posters will be displayed close to the refreshment area so that all who attend will have an opportunity to see them. There will be a timetabled period when Poster Owners should staff their poster so that participants can come and discuss the research.

Round Table Proposals
The Programme Committee invites topical subjects to be proposed for discussion.

Submission requirements
An abstract proposing a topic and stating why it is felt this would be an interesting contribution to the conference should be submitted in accordance with the submission details below. Be sure to select Round Table Proposal as the submission type.

Proposals will be considered by the programme committee.
If a proposal is selected the convenor will be asked to nominate knowledge informants in the field who will be prepared to participate. Round Table Discussions can be either 30 minutes or 1 hour in duration. The convenor must register for the conference.
Other participants can attend the Round Table without conference registration, but if they wish to attend any other part of the conference registration will be required.

Practitioner Contributions
The conference committee welcomes contributions from individuals and organisations working in the field. These contributions can take the form of a presentation or a demonstration.

Submission requirements
An abstract describing the work to be presented should be submitted in accordance with the submission details below. Be sure to select Practitioner Contribution as the submission type.
Practitioner abstracts will be reviewed by the programme committee. Reviewers will be asked to consider the appropriateness of the work for presentation at the conference.
Authors of selected presentations will have their abstract included in the booklet of abstracts given to participants at the conference.
At least one person must register for the conference to give the presentation.

Product Demonstrations:
Submit a proposal of 200-300 words describing a product you wish to demonstrate and the audience it serves. Proposals should be sent as email attachments to Sue Nugus ( sue@academic-conferences.org ) not later than 5 November 2009. Demonstrations themselves are expected to be approximately 15 minutes in length.

Submission details

Abstract details:
The Abstract should be a minimum of 300 and no more than 500 words including keywords to be received by 17 September 2009 Please read the Abstract Guidelines section of the website before submitting.

Online via the submission form. Please ensure that you complete all relevant sections of the form, including the conference track the abstract is intended for, the proposed title for the paper, the full names (first name and surname, not initials) and email addresses of all authors and a postal address and telephone number for at least one contact author. Please indicate clearly if the contact author is not the lead author.

Full paper:
Only required after acceptance of abstract and not to be more than 5,000 words including abstract, keywords and references. Submission date will be no later than 5 November 2009. Papers should be submitted as .doc or .rtf file attachments by email to the Conference Manager, Elaine Hayne.

Important information

The selection panel of the conference committee will consider all abstracts received by the submission deadline to ensure that the proposed paper is relevant to the Conference. The authors of abstracts, which describe a relevant paper, will receive a notification of abstract acceptance. All full papers will be double-blind reviewed by members of the conference committee to ensure an adequate standard, that the proposed subject of their abstract has been followed, that the paper is of a suitable length, the standard of English is adequate and the paper is appropriately referenced. Papers that are accepted will be published in the conference proceedings providing at least one author registers and presents the work at the Conference (see the registration section of the conference website for more information about registration). Due to the large number of papers expected for this conference, the committee only allows an author to present one paper. Therefore if multiple papers are accepted for presentation different co-authors need to present each paper. Author registration must be completed by 4 March 2010.

Publication opportunity

Papers accepted for the conference will be published in the conference proceedings, subject to author registration. The proceedings for this conference are listed in the Thomson Reuters ISI Index to Scientific and Technical Proceedings (ISTP/ISI Proceedings), the Thomson Reuters ISI Index to Social Sciences & Humanities Proceedings (ISSHP) and the Thomson Reuters ISI Index to Social Sciences & Humanities Proceedings (ISSHP/ISI Proceedings).

Selected papers from the Conference will be considered for publication in a special issue of the Journal of Information Warfare: http://www.jinfowar.com. Additionally, selected papers from the conference will be considered for publication in the International Journal of Electronic Security and Digital Forensics published by Inderscience UK (ISSN:1751-1911X).


Wright-Patterson Air Force Base, Ohio, USA
United Kingdom

Additional Information

Important Dates Abstract submission deadline: 17 September 2009 Notification of abstract acceptance: 24 September 2009 Full paper due for review: 5 November 2009 Notification of paper acceptance(with any requested changes): 14 January 2010 Earlybird registration closes 1 February 2010 Final paper due: 15 February 2010 Final author registration date 4 March 2010