default search action
Search dblp for Publications
export results for "stream:conf/infosec:"
@inproceedings{DBLP:conf/infosec/Al-AhmadM15, author = {Walid Al{-}Ahmad and Basil Mohammed}, title = {A code of practice for effective information security risk management using {COBIT} 5}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {145--151}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435520}, doi = {10.1109/INFOSEC.2015.7435520}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/infosec/Al-AhmadM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/AlamBKF15, author = {Delwar Alam and Touhid Bhuiyan and Md. Alamgir Kabir and Tanjila Farah}, title = {SQLi vulnerabilty in education sector websites of Bangladesh}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {152--157}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435521}, doi = {10.1109/INFOSEC.2015.7435521}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosec/AlamBKF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/AmankwaLK15, author = {Eric Amankwa and Marianne Loock and Elmarie Kritzinger}, title = {Enhancing information security education and awareness: Proposed characteristics for a model}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {72--77}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435509}, doi = {10.1109/INFOSEC.2015.7435509}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosec/AmankwaLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/CharlesP15, author = {T. Charles and Michael Pollock}, title = {Digital forensic investigations at universities in South Africa}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {53--58}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435506}, doi = {10.1109/INFOSEC.2015.7435506}, timestamp = {Fri, 12 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/CharlesP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/CheribiK15, author = {Haoua Cheribi and Mohamed{-}Khireddine Kholladi}, title = {A security model for complex applications based on normative multi-agents system}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {41--46}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435504}, doi = {10.1109/INFOSEC.2015.7435504}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/CheribiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/DarAUK15, author = {Muhammad Najam Dar and M. Usman Akram and Anam Usman and Shoab Ahmad Khan}, title = {{ECG} biometric identification for general population using multiresolution analysis of {DWT} based features}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {5--10}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435498}, doi = {10.1109/INFOSEC.2015.7435498}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/DarAUK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/DoroudianATG15, author = {Mostafa Doroudian and Narges Arastouie and Mohammad Talebi and Ali Reza Ghanbarian}, title = {Multilayered database intrusion detection system for detecting malicious behaviors in big data transaction}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {105--110}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435514}, doi = {10.1109/INFOSEC.2015.7435514}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/DoroudianATG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/HopkinsD15, author = {Michael Hopkins and Ali Dehghantanha}, title = {Exploit Kits: The production line of the Cybercrime economy?}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {23--27}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435501}, doi = {10.1109/INFOSEC.2015.7435501}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/HopkinsD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/HughesSH15, author = {Kevin Hughes and Adrie Stander and Val A. Hooper}, title = {eDiscovery in South Africa and the challenges it faces}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {59--65}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435507}, doi = {10.1109/INFOSEC.2015.7435507}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/HughesSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/IsongGOF15, author = {Bassey Isong and Naison Gasela and Ifeoma U. Ohaeri and Elegbeleye Femi}, title = {RFID-based design-theoretical framework for combating police impersonation in South Africa}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {78--85}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435510}, doi = {10.1109/INFOSEC.2015.7435510}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/IsongGOF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/KyawCJ15, author = {Ar Kar Kyaw and Yuzhu Chen and Justin Joseph}, title = {Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {165--170}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435523}, doi = {10.1109/INFOSEC.2015.7435523}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/KyawCJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/KyawSJ15, author = {Ar Kar Kyaw and Franco Sioquim and Justin Joseph}, title = {Dictionary attack on Wordpress: Security and forensic analysis}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {158--164}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435522}, doi = {10.1109/INFOSEC.2015.7435522}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/KyawSJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/Mathonsi15, author = {Topside E. Mathonsi}, title = {Optimized handoff and secure roaming model for wireless networks}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {134--139}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435518}, doi = {10.1109/INFOSEC.2015.7435518}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/Mathonsi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/MejaeleO15, author = {Lineo Mejaele and Elisha Oketch Ochola}, title = {Analysing the impact of black hole attack on DSR-based {MANET:} The hidden network destructor}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {140--144}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435519}, doi = {10.1109/INFOSEC.2015.7435519}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/MejaeleO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/MoorosiM15, author = {Nyalleng Moorosi and Vukosi Marivate}, title = {Privacy in mining crime data from social Media: {A} South African perspective}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {171--175}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435524}, doi = {10.1109/INFOSEC.2015.7435524}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/MoorosiM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/MushcabG15, author = {Reema Al Mushcab and Pavel Gladyshev}, title = {The significance of different backup applications in retrieving social networking forensic artifacts from Android-based mobile devices}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {66--71}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435508}, doi = {10.1109/INFOSEC.2015.7435508}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/MushcabG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/NjengaN15, author = {Kennedy Njenga and Sifiso Ndlovu}, title = {Mobile banking and information security risks: Demand-side predilections of South African lead-users}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {86--92}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435511}, doi = {10.1109/INFOSEC.2015.7435511}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/NjengaN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/ParkerB15, author = {Shabier Parker and Jean{-}Paul Van Belle}, title = {Lifelogging and lifeblogging: Privacy issues and influencing factors in South Africa}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {111--117}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435515}, doi = {10.1109/INFOSEC.2015.7435515}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/ParkerB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/ParkerOBK15, author = {Fayyaadh Parker and Jacques Ophoff and Jean{-}Paul Van Belle and Ross Karia}, title = {Security awareness and adoption of security controls by smartphone users}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {99--104}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435513}, doi = {10.1109/INFOSEC.2015.7435513}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosec/ParkerOBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/SaadSS15, author = {Mustafa Hassan Saad and Ahmed Serageldin and Goda Ismaeel Salama}, title = {Android spyware disease and medication}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {118--125}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435516}, doi = {10.1109/INFOSEC.2015.7435516}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/SaadSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/SarfrazR15, author = {Muhammad Sarfraz and Syed M. A. J. Rizvi}, title = {An intelligent system for Online Signature Verification}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {17--22}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435500}, doi = {10.1109/INFOSEC.2015.7435500}, timestamp = {Tue, 20 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/SarfrazR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/ShabutDAP15, author = {Antesar M. Shabut and Keshav P. Dahal and Irfan Awan and Zeeshan Pervez}, title = {Route optimasation based on multidimensional trust evaluation model in mobile ad hoc networks}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {28--34}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435502}, doi = {10.1109/INFOSEC.2015.7435502}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/ShabutDAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/ShangWZQ15, author = {Wenli Shang and Ming Wan and Peng Zeng and Quansheng Qiao}, title = {Research on self-learning method on generation and optimization of industrial firewall rules}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {47--52}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435505}, doi = {10.1109/INFOSEC.2015.7435505}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/ShangWZQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/TahirA15, author = {Madiha Tahir and M. Usman Akram}, title = {Online signature verification using hybrid features}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {11--16}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435499}, doi = {10.1109/INFOSEC.2015.7435499}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/TahirA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/VuurenKM15, author = {Ileen E. van Vuuren and Elmarie Kritzinger and Conrad Mueller}, title = {Identifying gaps in {IT} retail Information Security policy implementation processes}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {126--133}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435517}, doi = {10.1109/INFOSEC.2015.7435517}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/VuurenKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/WaheedAWS15, author = {Zahra Waheed and M. Usman Akram and Amna Waheed and Arslan Shaukat}, title = {Robust extraction of blood vessels for retinal recognition}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435497}, doi = {10.1109/INFOSEC.2015.7435497}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/WaheedAWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/WalazaLK15, author = {Mvelo Walaza and Marianne Loock and Elmarie Kritzinger}, title = {A pragmatic approach towards the integration of {ICT} security awareness into the South African education system}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {35--40}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435503}, doi = {10.1109/INFOSEC.2015.7435503}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/WalazaLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/ZhuJ15, author = {Ruilin Zhu and Lech J. Janczewski}, title = {Typology of information systems security research: {A} methodological perspective}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {93--98}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435512}, doi = {10.1109/INFOSEC.2015.7435512}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/ZhuJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/infosec/2015, title = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7431308/proceeding}, isbn = {978-1-4673-6988-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.