default search action
11th ISSA 2012: Johannesburg, South Africa
- Hein S. Venter, Marianne Loock, Marijke Coetzee:
2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012. IEEE 2012, ISBN 978-1-4673-2160-0 - Hein S. Venter, Marianne Loock, Marijke Coetzee:
Introduction. 1 - Jason Jordaan:
A Sample of digital forensic quality assurance in the South African criminal justice system. 1-7 - Heloise Pieterse, Martin S. Olivier:
Android botnets on the rise: Trends and characteristics. 1-5 - Etienne Stalmans, Samuel O. Hunter, Barry Irwin:
Geo-spatial autocorrelation as a metric for the detection of Fast-Flux botnet domains. 1-7 - Reijo M. Savola:
Strategies for security measurement objective decomposition. 1-8 - Mark M. Seeger, Stephen D. Wolthusen:
A model for partially asynchronous observation of malicious behavior. 1-7 - Caroline Oehri, Stephanie Teufel:
Social media security culture. 1-5 - Tapiwa Gundu, Stephen Flowerday:
The enemy within: A behavioural intention model and an information security awareness process. 1-8 - Sobhana Rama, Stephen Flowerday, Duane Boucher:
Information confidentiality and the Chinese Wall Model in Government tender fraud. 1-8 - Christien Kroeze, Martin S. Olivier:
Gamifying authentication. 1-8 - Nureni Ayofe Azeez, Isabella Margarethe Venter:
Towards achieving scalability and interoperability in a triple-domain grid-based environment (3DGBE). 1-10 - Aleksandar Valjarevic, Hein S. Venter:
Harmonised digital forensic investigation process model. 1-10 - Irene Okere, Johan Van Niekerk, Mariana Carroll:
Assessing information security culture: A critical analysis of current approaches. 1-8 - Phumezo Ntlatywa, Reinhardt A. Botha, Bertram Haskins:
Claimed vs observed information disclosure on social networking sites. 1-6 - Manuel Corregedor, Sebastiaan H. von Solms:
ATE: Anti-malware technique evaluator. 1-8 - Frank Breitinger, Harald Baier:
Properties of a similarity preserving hash function and their realization in sdhash. 1-8 - Tiny du Toit, Hennie A. Kruger:
Filtering spam e-mail with Generalized Additive Neural Networks. 1-8 - Xuefei Leng, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Tag Group Authentication Using Bit-Collisions. 1-8 - Nickson M. Karie, Hein S. Venter:
Measuring semantic similarity between digital forensics terminologies using web search engines. 1-9 - Samuel O. Hunter, Etienne Stalmans, Barry Irwin, John Richter:
Remote fingerprinting and multisensor data fusion. 1-8 - Marius Potgieter, Johan Van Niekerk:
The use of computer vision technologies to augment human monitoring of secure computing facilities. 1-6 - George Sibiya, Hein S. Venter, Sipho Ngobeni, Thomas Fogwill:
Guidelines for procedures of a harmonised digital forensic process in network forensics. 1-7 - Antonio Pooe, Les Labuschagne:
A conceptual model for digital forensic readiness. 1-8 - Kennedy Njenga, Sifiso Ndlovu:
On privacy calculus and underlying consumer concerns influencing mobile banking subscriptions. 1-9 - Neil J. Croft:
On forensics: A silent SMS attack. 1-4 - Barry Irwin:
A network telescope perspective of the Conficker outbreak. 1-8 - Anne V. D. M. Kayem, Azhar Deshai, Stuart Hammer:
On anonymizing social network graphs. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.