default search action
13th ISSA 2014: Johannesburg, South Africa
- Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff:
2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014. IEEE 2014, ISBN 978-1-4799-3384-6 - Miemie Mogale, Mariana Gerber, Mariana Carroll, Rossouw von Solms:
Information Security Assurance Model (ISAM) for an Examination Paper Preparation Process. 1-10 - Rayne Reid, Johan Van Niekerk, Karen Renaud:
Information security culture: A general living systems theory perspective. 1-8 - Sayed Enayat Sayed Ally, Craig Blewett, Brett van Niekerk:
Facebook: The risk-taking attitude amongst Emerging Adults. 1-6 - Pierre Schnarz, Clemens Fischer, Joachim Wietzke, Ingo Stengel:
On a domain block based mechanism to mitigate DoS attacks on shared caches in asymmetric multiprocessing multi operating systems. 1-8 - Rayne Reid, Johan Van Niekerk:
From information security to cyber security cultures. 1-7 - Charlie Hinde, Jacques Ophoff:
Privacy: A review of publication trends. 1-7 - Emilio Raymond Mumba, Hein S. Venter:
Mobile forensics using the harmonised digital forensic investigation process. 1-10 - Sean Pennefather, Barry Irwin:
An exploration of geolocation and traffic visualisation using network flows. 1-6 - Werner K. Hauger, Martin S. Olivier:
The role of triggers in database forensics. 1-7 - Philip M. Trenwith, Hein S. Venter:
A digital forensic model for providing better data provenance in the cloud. 1-6 - Edwin Donald Frauenstein, Rossouw von Solms:
Combatting phishing: A holistic human approach. 1-10 - Jameel Haffejee, Barry Irwin:
Testing antivirus engines to determine their effectiveness as a security layer. 1-6 - Nkosinathi Mpofu, Wynand J. C. van Staden:
A survey of trust issues constraining the growth of Identity Management-as-a-Service(IdMaaS). 1-6 - Elmarie Kritzinger:
Online safety in South Africa - A cause for growing concern. 1-7 - Jaco Robertson:
Integrity of a common operating picture in military situational awareness. 1-7 - Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff:
Introduction. 1 - Nicolai Kuntze, Carsten Rudolph, Oliver Hanka:
Security foundation for a distributed cabin core architecture. 1-6 - Reijo M. Savola, Markku Kylänpää:
Security objectives, controls and metrics development for an Android smartphone application. 1-8 - Zubeida Casmod Khan, Thulani Mashiane:
An analysis of Facebook's graph search. 1-8 - Jacques Coertze, Rossouw von Solms:
The murky waters of IT governance. 1-8 - Wynand J. C. van Staden:
An investigation into reducing third party privacy breaches during the investigation of cybercrime. 1-6 - Juan-Camilo Castillo:
The Mexican Cartels' employment of Inform and Influence Activities (IIA) as tools of asymmetrical warfare. 1-8 - Aleksandar Valjarevic, Hein S. Venter, Melissa Ingles:
Towards a prototype for guidance and implementation of a standardized digital forensic investigation process. 1-8 - Warren P. Du Plessis:
Software-defined radio (SDR) as a mechanism for exploring cyber-electronic warfare (EW) collaboration. 1-6 - Francois Mouton, Mercia M. Malan, Louise Leenen, Hein S. Venter:
Social engineering attack framework. 1-9 - Peter M. Wrench, Barry Irwin:
Towards a sandbox for the deobfuscation and dissection of PHP malware. 1-8 - Jacques Ophoff, Mark Robinson:
Exploring end-user smartphone security awareness within a South African context. 1-7 - Luzuko Tekeni, Kerry-Lynn Thomson, Reinhardt A. Botha:
Concerns regarding service authorization by IP address using eduroam. 1-6 - Abdul Mirza, Makhamisa Senekane, Francesco Petruccione, Brett van Niekerk:
Suitability of quantum cryptography for national facilities. 1-7 - Ignus P. Swart, Barry Irwin, Marthie Grobler:
Towards a platform to visualize the state of South Africa's information security. 1-8 - Wayne D. Kearney, Hennie A. Kruger:
Considering the influence of human trust in practical social engineering exercises. 1-6 - Kudakwashe Madzima, Moses Moyo, Hanifa Abdullah:
Is bring your own device an institutional information security risk for small-scale business organisations? 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.