default search action
9th ISSA 2010: Sandton, South Africa
- Hein S. Venter, Marijke Coetzee, Marianne Loock:
Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings ISSA 2010. ISSA, Pretoria, South Africa 2010, ISBN 978-1-4244-5494-5
Reviewed Research Papers
- Anass Bayaga, Stephen Flowerday:
A Conceptual Operational Risk Model for SMEs: Impact on Organisational Information Technology. - Cornelia Grobler, Buks Louwrens:
A Digital Evidence Management Plan. - David Barske, Adrie Stander, Jason Jordaan:
A Digital Forensic Readiness Framework for South African SME's. - Eugene Smith, Hennie A. Kruger:
A framework for evaluating IT security investments in a banking environment. - Oliver Spycher, Rolf Haenni:
A Novel Protocol to Allow Revocation of Votes in a Hybrid Voting System. - Francois Ruan Van Staden, Hein S. Venter:
Adding digital forensic readiness to the email trace header. - Ziyad S. Al-Salloum, Stephen D. Wolthusen:
Agent-Based Host Enumeration and Vulnerability Scanning Using Dynamic Topology Information. - Marthie Grobler, Joey Jansen van Vuuren:
Broadband broadens scope for cyber crime in Africa. - Marthie Grobler, Harri Bryk:
Common problems faced during the establishment of a CSIRT. - Tristan Lavarack, Marijke Coetzee:
Considering web services security policy compatibility. - Ryan G. Goss, Reinhardt A. Botha:
Deep Packet Inspection - Fear of the Unknown. - Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
An investigation and survey of response options for Intrusion Response Systems (IRSs). - Michael Kyobe:
Towards a framework to guide compliance with IS Security policies and Regulations in a university. - Brett van Niekerk, Manoj S. Maharaj:
Mobile Security from an Information Warfare Perspective. - Anne Kayem:
On Monitoring Information Flow of Outsourced Data. - Greg Megaw, Stephen Flowerday:
Phishing within E-Commerce: A Trust and Confidence Game. - Karen Renaud, Dora Galvez-Cruz:
Privacy: Aspects, Definitions and a Multi-Faceted Privacy Preservation Approach. - Richard Ssekibuule:
Secure Publish-Subscribe Mediated Virtual Organizations. - Monique Bezuidenhout, Francois Mouton, Hein S. Venter:
Social Engineering Attack Detection Model: SEADM. - Mark M. Seeger, Stephen D. Wolthusen, Christoph Busch, Harald Baier:
The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation. - Sumant Ramgovind, Mariki M. Eloff, Elme Smith:
The Management of Cloud Computing Security. - Valiya Gangadharan, Laurette Pretorius:
Towards an Ethical Analysis of the W3C Web Services Architecture Model. - Jacqui Chetty, Marijke Coetzee:
Towards an Information Security Framework for Service-Oriented Architecture. - Reijo Savola, Heimo Pentikäinen, Moussa Ouedraogo:
Towards Security Effectiveness Measurement utilizing Risk-Based Security Assurance.
Research in Progress Papers
- Hendrik Visage, Martin S. Olivier:
A Generalized model for understanding and education of Information and Computer Security. - Alok Tripathi, Abhinav Mishra, G. V. Raghunathan:
A Test Bed for Information Security Skill Development with Virtual Training Environment. - Moses Dlamini, Elmarie Venter, Jan H. P. Eloff, Danie Smit:
Inclusive Information Society - Challenges from a South African Rural Primary Healthcare Perspective. - Namosha Veerasamy:
Motivation for Cyberterrorrism. - Mohamed Al Fairuz, Karen Renaud:
Multi-channel, Multi-level Authentication for More Secure eBanking. - Marthie Grobler:
Phishing for Fortune. - Himal Lalla, Stephen Flowerday:
Towards a Standardised Digital Forensic Process: E-mail Forensics. - Alain Craven, Mariki M. Eloff:
Biometrics as an Agent to Reduce Fraud in the Micro Lending Industry in South Africa.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.