default search action
10th ISSA 2011: Johannesburg, South Africa
- Hein S. Venter, Marijke Coetzee, Marianne Loock:
Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings ISSA 2011. ISSA, Pretoria, South Africa 2011, ISBN 978-1-4577-1482-5
Reviewed Research Papers
- Etienne Stalmans:
A Framework for DNS based detection and mitigation of malware infections on a network. - Timo Winkelvos, Carsten Rudolph, Jürgen Repp:
A Property Based Security Risk Analysis Through Weighted Simulation. - Reijo Savola, Petri Heinonen:
A Visualization and Modeling Tool for Security Metrics and Measurements Management. - Jacques Coertze, Johan Van Niekerk, Rossouw von Solms:
A web-based information security governance toolbox for small-to-medium enterprises in Southern Africa. - Franscois Van Staden, Hein S. Venter:
Adding digital forensic readiness to electronic communication using a security monitoring tool. - Sean Allam, Stephen Flowerday:
An adaptation of the awareness boundary model towards smartphone security. - Robert Koletka, Andrew Hutchison:
An Architecture for Secure Searchable Cloud Storage. - Hennie A. Kruger, Stephen Flowerday, Lynette Drevin, Tjaart Steyn:
An assessment of the role of cultural factors in information security awareness. - Shaun Egan:
An Evaluation of Lightweight Classification Methods for Identifying Malicious URLs. - Ivan Daniel Burke, Martin S. Olivier:
Analysing the fairness of trust-based Mobile Ad Hoc Network protocols. - Endre Bangerter, Stephan Krenn, Matrial Seifriz, Ulrich Ultes-Nitsche:
cPLC - A Cryptographic Programming Language and Compiler. - Aubrey Labuschagne, Namosha Veerasamy, Ivan Burke:
Design of cyber security awareness game utilizing a social media framework. - Raja Khurram Shahzad, Niklas Lavesson:
Detecting Scareware by Mining Variable Length Instruction Sequences. - Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl:
Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data. - Donovan Isherwood, Marijke Coetzee:
Enhancing Digital Business Ecosystem Trust and Reputation with Centrality Measures. - Nico Pieter Fouche, Kerry-Lynn Thomson:
Exploring the Human Dimension of TETRA. - Rayne Reid, Johan Van Niekerk, Rossouw von Solms:
Guidelines for the creation of brain compatible cyber security educational material in Moodle 2.0. - Manuel Corregedor, Sebastiaan H. von Solms:
Implementing Rootkits to Address Operating System Vulnerabilities. - Paul Tarwireyi, Stephen Flowerday, Anass Bayaga:
Information Security Competence Test with Regards to Password Management. - Rossouw von Solms, Kerry-Lynn Thomson, Mvikeli Maninjwa:
Information Security Governance control through comprehensive policy architectures. - Anton Borg, Martin Boldt, Niklas Lavesson:
Informed Software Installation Through License Agreement Categorization. - Stephen Serra, Hein S. Venter:
Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness. - Tinus Strauss, Martin S. Olivier:
Network Forensics in a Clean-Slate Internet Architecture. - Ryan Galpin, Stephen Flowerday:
Online Social Networks: Enhancing user trust through effective controls and identity management. - Mariana Carroll, Paula Kotzé, Alta van der Merwe:
Secure Cloud Computing: Benefits, Risks and Controls. - Geoffrey Karokola, Stewart Kowalski, Louise Yngström:
Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models. - Aleksandar Valjarevic, Hein S. Venter:
Towards a Digital Forensics Readiness Framework for Public Key Infrastructure Systems. - Ryan Gavin Goss, Reinhardt A. Botha:
Traffic Management in Next Generation Service Provider Networks - Are We There Yet?
Research in Progress
- Nontokozo P. Khanyile, Jules-Raymond Tapamo, Erick Dube:
A Comparative Study of Fingerprint Thinning algorithms. - Hector Beyers, Martin S. Olivier, Gerhard P. Hancke:
An approach to examine the Metadata and Data of a database Management System by making use of a forensic comparison tool. - Elisha O. Ochola, Mariki M. Eloff:
A Review of Black Hole attack on AODV Routing in MANET. - Waldo Delport, Michael Köhn, Martin S. Olivier:
Isolating a cloud instance for a digital forensic investigation. - Anastassia S. Rakitianskaia, Martin S. Olivier, Antony K. Cooper:
Nature and Forensic investigation of crime in Second Life. - Duane Boucher, Stephen Flowerday:
Privacy: In pursuit of Information security awareness. - Ka Fai Peter Chan:
Secret sharing in audio steganography. - Enos K. Mabuto, Hein S. Venter:
State of the Art of Digital Forensic Techniques. - Samuel O. Hunter, Barry Irwin:
Tartarus: A honeypot based malware tracking and mitigation framework. - Marthie Grobler, Zama Dlamini, Sipho Ngobeni, Aubrey Labuschagne:
Towards a Cyber security aware rural community. - Namosha Veerasamy, Jan H. P. Eloff:
UML Modelling Of Network Warfare Examples.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.