FAQ: See http://www.ticm.com/kb/faq/idsfaq.html IDS: See http://www-rnks.informatik.tu-cottbus.de/~sobirey/ids.html HELP: Having problems.. Then email questions to ids-owner@uow.edu.au NOTE: You MUST remove this line from reply messages as it will be filtered. SPAM: DO NOT send unsolicted mail to this list. USUB: email "unsubscribe ids" to majordomo@uow.edu.au --------------------------------------------------------------------------- The Insider has now had the first issue published in the new format - http://www.ticm.com/info/insider/index.html To continue the trend we need more papers. All papers will be refereed by our editorial team (http://www.ticm.com/info/insider/editors.html) Editorial Policy The Insider is a refereed all-electronic journal that welcomes papers in all branches of security, including IT security, Physical security, information security, operational security, etc. Papers can be electronically submitted in MS Word, FrameMaker MIF, plain text and HTML. Research articles as well as articles of more general interest are solicited. These will be published under different headings in the Journal. Refereeing of papers will be conventional, aside from being carried out via e-mail. Publication will be in the month after the paper has been accepted and a completed copyright form has been received. Papers should relate to the relevant field and will usually fall into one of the following categories: Research paper. A paper making an original contribution to security knowledge. Special interest paper. Report on significant aspects of a major or notable project. Review paper for specialists. A critical survey of a relevant area, intended for specialists in the field covered. Review paper for non-specialists. An overview of a relevant area, suitable for a reader with a security or audit background. Tutorial paper. A paper which explains an important subject or clarifies the approach to a matter of design or audit. Technical Communication. A technical communication or a letter to the editors not sufficiently developed or extensive in scope to constitute a full paper. A contribution to discuss a published paper to which the original author’s response will be sought. The expected length of acceptable contributions will vary considerably, but 1000 to 2000 words for papers could be the norm. Technical communications should not exceed 1000 words and contributions to discuss papers should not exceed 500 words. Authors should submit an outline (or an abstract) of their proposed paper along with their name and a contact email address to submissions@ticm.com Yours, Bret Watson - ed Technical Incursion Countermeasures consulting@TICM.COM http://www.ticm.com/ ph: (+61)(041) 4411 149(UTC+8 hrs) fax: (+61)(08) 9454 6042 The Insider - a e'zine on Computer security Vol 3 Issue 1 out now http://www.ticm.com/info/insider/index.html