Volume 16, Issue 4

Volume 16, Issue 4 Editorial

Stylized Image of the Word Editorial

Fall 2017

Information has always been a weapon; and, throughout most of human civilisation, it has been hoarded and kept limited to those groups that had control over it. Early on, the Internet was seen as democratic and liberating. As recent events have demonstrated, however, the Internet has become another domain in which information can be weaponised and used to the advantage of a person, an organisation, or a nation-state. 

Understanding Cyber Terrorism from Motivational Perspectives


There is no universally accepted definition of cyber terrorism, the lack of which is both an issue and a challenge in countering cyber-terrorism threats. To better understand why cyber- terrorism acts are committed, this study examines cyber terrorism from motivational perspectives. Motivational forces behind cyber terrorism can be social, political, ideological, and economic.

Password Recovery and Data Retrieval in the Android Operating System


This paper considers how data and passwords are recovered across different versions of the Android Operating System (OS). This solution has been achieved by forensically retrieving passwords that were set up in Android 4.4 to 5.0.2. XRY Extraction Wizard and XRY Reader were used as tools to conduct this investigation.

Preparation, Modelling, and Visualisation of Cyber Common Operating Pictures for National Cyber Security Centres


Common Operating Pictures (COPs) have long been a common denominator of effective cyber defence operations (for example, in law enforcement and the military). COPs are widely used to represent, visualise, and assess situations. In recent years, Cyber COPs (CCOPs) have become important in establishing cyber situational awareness. 

Creation of Flow-Based Data Sets for Intrusion Detection


Publicly available labelled data sets are necessary for evaluating anomaly-based Intrusion Detection Systems (IDSs). However, existing data sets are often not up-to-date or not yet published because of privacy concerns. This paper identifies requirements for good data sets and proposes an approach for their generation.

Energy-Conscious Adaptive-Security Scheme: A Reliability-Based Stochastic Approach


The increasing importance of information and communication, which plays a big role in a number of different fields in the modern era, brings with it the need for security. At the same time, encryption, which is an indispensable part of security architecture, is computationally intensive and may require a significant amount of energy consumption. Thus, it is of great importance to provide a sufficient level of security while properly utilising the available resources. This research suggests a security framework based on the Reliability Function, along with the added ability to dynamically adjust the security level with respect to energy consumption, either according to the severity of the requested service or according to a specified energy threshold.

Ant Tree Miner Amyntas: Automatic, Cost-Based Feature Selection for Intrusion Detection


Intrusion Detection Systems (IDSs) analyse network traffic to identify suspicious patterns which indicate the intention to compromise the system. Traditional detection methods are still the norm for commercial products promoting a rigid, manual, and static detection platform. This paper focuses on recent advances in machine learning by implementing the Ant Tree Miner Amyntas (ATMa) classifier within intrusion detection. The proposed ATMa use Ant Colony Optimisation and a cost-based evaluation function to automatically select features from a data set before inducing Decision Trees (DTs) that classify network data.

Phobic Cartography: A Human-Centred, Communicative Analysis of the Cyber-Threat Landscape


As with all domains, cyber security runs the risk of adopting a reactive and defensive stance, which can lead to policy based on what has happened, rather than on what could happen. Expert knowledge can lead to silo thinking and ‘groupthink’, and a lack of communication between public and private, civilian and military sectors. This study offers a synoptic examination of the field by pooling the knowledge of practitioners from across the discipline. Drawing on a blended methodology, combining automated quantitative analysis with qualitative study, this project examines the challenges faced by considering the nature of perceived (rather than actual) risks.

Should ‘RuNet 2020’ Be Taken Seriously? Contradictory Views about Cyber Security Between Russia and the West


Russia aims to create an independent state information system that ensures the network’s overall stability by controlling the Internet routing architecture inside Russia. A tightly regulated and secure ‘information space’ will not only ensure stronger defence against external attacks, but also increase offensive capabilities.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.
















Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.


Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455