default search action
15th ISSA 2016: Johannesburg, South Africa
- Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff:
2016 Information Security for South Africa, ISSA 2016, Johannesburg, South Africa, August 17-18, 2016. IEEE 2016, ISBN 978-1-5090-2473-5 - Noluvuyo Fani, Rossouw von Solms, Mariana Gerber:
A framework towards governing "Bring Your Own Device in SMMEs". 1-8 - Paulus Swartz, Adéle da Veiga:
PoPI Act - opt-in and opt-out compliance from a data value chain perspective: A South African insurance industry experiment. 9-17 - Petrus M. J. Delport, Mariana Gerber, Nader Sohrabi Safa:
An interactive visual library model to improve awareness in handling of business information. 18-26 - Ryan De Kock, Lynn Ann Futcher:
Mobile device usage in higher education institutions in South Africa. 27-34 - Yusuf Moosa Motara, Barry Irwin:
SHA-1 and the Strict Avalanche Criterion. 35-40 - J. N. Samuel, Warren P. Du Plessis:
Specific emitter identification for enhanced access control security. 41-47 - Nicholas Scharnick, Mariana Gerber, Lynn Futcher:
Review of data storage protection approaches for POPI compliance. 48-55 - Olanrewaju B. Wojuola, Stanley H. Mneney, Viranjay M. Srivastava:
CDMA in signal encryption and information security. 56-61 - Lineo Mejaele, Elisha Oketch Ochola:
Effect of varying node mobility in the analysis of black hole attack on MANET reactive routing protocols. 62-68 - Johannes S. Vorster, Renier P. van Heerden, Barry Irwin:
The pattern-richness of Graphical passwords. 69-76 - Lauren Rudman, Barry Irwin:
Dridex: Analysis of the traffic and automatic generation of IOCs. 77-84 - Mfundo Glenn Masango, Francois Mouton, Alastair Nottingham, Jabu Mtsweni:
Context Aware Mobile Application for mobile devices. 85-90 - Wynand J. C. van Staden, Etienne van der Poel:
Team formation in digital forensics. 91-97 - Edwin Donald Frauenstein, Stephen V. Flowerday:
Social network phishing: Becoming habituated to clicks and ignorant to threats? 98-105 - Othoman Elaswad, Christian Damsgaard Jensen:
Identity management for e-government Libya as a case study. 106-113 - Chollette C. Olisah, Peter Ogedebe:
Recognizing surgically altered faces using local edge gradient Gabor magnitude pattern. 114-120 - Alan Herbert, Barry Irwin:
Adaptable exploit detection through scalable NetFlow analysis. 121-128 - Patrick Monamo, Vukosi Marivate, Bheki Twala:
Unsupervised learning for robust Bitcoin fraud detection. 129-134
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.