default search action
Search dblp for Publications
export results for "stream:conf/issa:"
@proceedings{DBLP:conf/issa/2019, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Information and Cyber Security - 18th International Conference, {ISSA} 2019, Johannesburg, South Africa, August 15, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1166}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-43276-8}, doi = {10.1007/978-3-030-43276-8}, isbn = {978-3-030-43275-1}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/AyongN19, author = {Kenneth Ayong and Rennie Naidoo}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {An Institutional Trust Perspective of Cloud Adoption Among SMEs in South Africa}, booktitle = {Information and Cyber Security - 18th International Conference, {ISSA} 2019, Johannesburg, South Africa, August 15, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1166}, pages = {145--157}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43276-8\_11}, doi = {10.1007/978-3-030-43276-8\_11}, timestamp = {Thu, 19 Mar 2020 14:43:24 +0100}, biburl = {https://dblp.org/rec/conf/issa/AyongN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BahAAK19, author = {Abdramane Bah and Pascal Andr{\'{e}} and J. Christian Attiogb{\'{e}} and Jacqueline Konat{\'{e}}}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Federation of Services from Autonomous Domains with Heterogeneous Access Control Models}, booktitle = {Information and Cyber Security - 18th International Conference, {ISSA} 2019, Johannesburg, South Africa, August 15, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1166}, pages = {83--98}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43276-8\_7}, doi = {10.1007/978-3-030-43276-8\_7}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BahAAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BaloyiK19, author = {Ntsako Baloyi and Paula Kotz{\'{e}}}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Data Privacy Compliance Benefits for Organisations - {A} Cyber-Physical Systems and Internet of Things Study}, booktitle = {Information and Cyber Security - 18th International Conference, {ISSA} 2019, Johannesburg, South Africa, August 15, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1166}, pages = {158--172}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43276-8\_12}, doi = {10.1007/978-3-030-43276-8\_12}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BaloyiK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BoltonGK19, author = {Anthony Bolton and Leila Goosen and Elmarie Kritzinger}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Security Aspects of an Empirical Study into the Impact of Digital Transformation via Unified Communication and Collaboration Technologies on the Productivity and Innovation of a Global Automotive Enterprise}, booktitle = {Information and Cyber Security - 18th International Conference, {ISSA} 2019, Johannesburg, South Africa, August 15, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1166}, pages = {99--113}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43276-8\_8}, doi = {10.1007/978-3-030-43276-8\_8}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/BoltonGK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GovenderKL19, author = {Sunthoshan G. Govender and Elmarie Kritzinger and Marianne Loock}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Information Security Cost Reduction Through Social Means}, booktitle = {Information and Cyber Security - 18th International Conference, {ISSA} 2019, Johannesburg, South Africa, August 15, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1166}, pages = {1--14}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43276-8\_1}, doi = {10.1007/978-3-030-43276-8\_1}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GovenderKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GovenderW19, author = {Indren Govender and Bruce Watson}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Theorising Information Security Policy Violations}, booktitle = {Information and Cyber Security - 18th International Conference, {ISSA} 2019, Johannesburg, South Africa, August 15, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1166}, pages = {131--144}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43276-8\_10}, doi = {10.1007/978-3-030-43276-8\_10}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GovenderW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HutchinsonO19, author = {Gershon Hutchinson and Jacques Ophoff}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {A Descriptive Review and Classification of Organizational Information Security Awareness Research}, booktitle = {Information and Cyber Security - 18th International Conference, {ISSA} 2019, Johannesburg, South Africa, August 15, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1166}, pages = {114--130}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43276-8\_9}, doi = {10.1007/978-3-030-43276-8\_9}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/HutchinsonO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/LekotaC19, author = {Faith Lekota and Marijke Coetzee}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {An Aviation Sector {CSIRT} for Sub-Saharan Africa}, booktitle = {Information and Cyber Security - 18th International Conference, {ISSA} 2019, Johannesburg, South Africa, August 15, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1166}, pages = {28--42}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43276-8\_3}, doi = {10.1007/978-3-030-43276-8\_3}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/LekotaC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MoganediP19, author = {Sophia Moganedi and Dalenca Pottas}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Threats and Vulnerabilities Affecting Fitness Wearables: Security and Privacy Theoretical Analysis}, booktitle = {Information and Cyber Security - 18th International Conference, {ISSA} 2019, Johannesburg, South Africa, August 15, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1166}, pages = {57--68}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43276-8\_5}, doi = {10.1007/978-3-030-43276-8\_5}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MoganediP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SnymanK19, author = {Dirk Snyman and Hennie A. Kruger}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {A Management Decision Support System for Evaluating Information Security Behaviour}, booktitle = {Information and Cyber Security - 18th International Conference, {ISSA} 2019, Johannesburg, South Africa, August 15, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1166}, pages = {15--27}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43276-8\_2}, doi = {10.1007/978-3-030-43276-8\_2}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SnymanK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Toit19, author = {Jaco du Toit}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {{PAUDIT:} {A} Distributed Data Architecture for Fitness Data}, booktitle = {Information and Cyber Security - 18th International Conference, {ISSA} 2019, Johannesburg, South Africa, August 15, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1166}, pages = {43--56}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43276-8\_4}, doi = {10.1007/978-3-030-43276-8\_4}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Toit19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ZazazaVS19, author = {Lelethu Zazaza and H. S. Venter and George Sibiya}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {A Conceptual Model for Consent Management in South African e-Health Systems for Privacy Preservation}, booktitle = {Information and Cyber Security - 18th International Conference, {ISSA} 2019, Johannesburg, South Africa, August 15, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1166}, pages = {69--82}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43276-8\_6}, doi = {10.1007/978-3-030-43276-8\_6}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/ZazazaVS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2018s, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Information Security - 17th International Conference, {ISSA} 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {973}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-11407-7}, doi = {10.1007/978-3-030-11407-7}, isbn = {978-3-030-11406-0}, timestamp = {Wed, 06 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/2018s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Frauenstein18, author = {Edwin Donald Frauenstein}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {An Investigation into Students Responses to Various Phishing Emails and Other Phishing-Related Behaviours}, booktitle = {Information Security - 17th International Conference, {ISSA} 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {973}, pages = {44--59}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11407-7\_4}, doi = {10.1007/978-3-030-11407-7\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Frauenstein18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Haar18, author = {Dustin Terence van der Haar}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Real-Time Face Antispoofing Using Shearlets}, booktitle = {Information Security - 17th International Conference, {ISSA} 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {973}, pages = {16--29}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11407-7\_2}, doi = {10.1007/978-3-030-11407-7\_2}, timestamp = {Wed, 06 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Haar18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/LoskutovaP18, author = {Tetyana Loskutova and Rivaj Parbhu}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Information Availability and Security in Foreign Corrupt Practices Act Investigations}, booktitle = {Information Security - 17th International Conference, {ISSA} 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {973}, pages = {60--75}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11407-7\_5}, doi = {10.1007/978-3-030-11407-7\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/LoskutovaP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ManjeziB18, author = {Zandile Manjezi and Reinhardt A. Botha}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Preventing and Mitigating Ransomware - {A} Systematic Literature Review}, booktitle = {Information Security - 17th International Conference, {ISSA} 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {973}, pages = {149--162}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11407-7\_11}, doi = {10.1007/978-3-030-11407-7\_11}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ManjeziB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MaonekeF18, author = {Pardon Blessings Maoneke and Stephen Flowerday}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Password Policies Adopted by South African Organizations: Influential Factors and Weaknesses}, booktitle = {Information Security - 17th International Conference, {ISSA} 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {973}, pages = {30--43}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11407-7\_3}, doi = {10.1007/978-3-030-11407-7\_3}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MaonekeF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MoyoL18, author = {Moses Moyo and Marianne Loock}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Small and Medium-Sized Enterprises' Understanding of Security Evaluation of Cloud-Based Business Intelligence Systems and Its Challenges}, booktitle = {Information Security - 17th International Conference, {ISSA} 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {973}, pages = {133--148}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11407-7\_10}, doi = {10.1007/978-3-030-11407-7\_10}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MoyoL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NiekerkE18, author = {Jan Hendrik van Niekerk and Elizabeth Marie Ehlers}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {{SA-EF} Cube: An Evaluation Framework for Assessing Intelligent Context-Aware Critical Information Infrastructure Protection Solutions}, booktitle = {Information Security - 17th International Conference, {ISSA} 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {973}, pages = {115--132}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11407-7\_9}, doi = {10.1007/978-3-030-11407-7\_9}, timestamp = {Wed, 06 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/NiekerkE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OphoffL18, author = {Jacques Ophoff and Mcguigan Lakay}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Mitigating the Ransomware Threat: {A} Protection Motivation Theory Approach}, booktitle = {Information Security - 17th International Conference, {ISSA} 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {973}, pages = {163--175}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11407-7\_12}, doi = {10.1007/978-3-030-11407-7\_12}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/OphoffL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ParkerB18, author = {Amaanullah Parker and Irwin Brown}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Skills Requirements for Cyber Security Professionals: {A} Content Analysis of Job Descriptions in South Africa}, booktitle = {Information Security - 17th International Conference, {ISSA} 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {973}, pages = {176--192}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11407-7\_13}, doi = {10.1007/978-3-030-11407-7\_13}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ParkerB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/PieterseOH18, author = {Heloise Pieterse and Martin S. Olivier and Renier van Heerden}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Detecting Manipulated Smartphone Data on Android and iOS Devices}, booktitle = {Information Security - 17th International Conference, {ISSA} 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {973}, pages = {89--103}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11407-7\_7}, doi = {10.1007/978-3-030-11407-7\_7}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/PieterseOH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Verkijika18, author = {Silas Formunyuy Verkijika}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {An Evaluation of the Password Practices on Leading e-Commerce Websites in South Africa}, booktitle = {Information Security - 17th International Conference, {ISSA} 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {973}, pages = {104--114}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11407-7\_8}, doi = {10.1007/978-3-030-11407-7\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Verkijika18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/WeilbachM18, author = {William Thomas Weilbach and Yusuf Moosa Motara}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Distributed Ledger Technology to Support Digital Evidence Integrity Verification Processes}, booktitle = {Information Security - 17th International Conference, {ISSA} 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {973}, pages = {1--15}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11407-7\_1}, doi = {10.1007/978-3-030-11407-7\_1}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/WeilbachM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ZazazaVS18, author = {Lelethu Zazaza and H. S. Venter and George Sibiya}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {The Current State of Electronic Consent Systems in e-Health for Privacy Preservation}, booktitle = {Information Security - 17th International Conference, {ISSA} 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {973}, pages = {76--88}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11407-7\_6}, doi = {10.1007/978-3-030-11407-7\_6}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ZazazaVS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/AldabbasTT17, author = {Mohammad Aldabbas and Stephanie Teufel and Bernd Teufel}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {The importance of security culture for crowd energy systems}, booktitle = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg, South Africa, August 16-17, 2017}, pages = {10--15}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISSA.2017.8251783}, doi = {10.1109/ISSA.2017.8251783}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/AldabbasTT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ChaipaE17, author = {Sarathiel Chaipa and Mariki M. Eloff}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Towards the development of an effective intrusion detection model}, booktitle = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg, South Africa, August 16-17, 2017}, pages = {32--39}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISSA.2017.8251772}, doi = {10.1109/ISSA.2017.8251772}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/ChaipaE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/FrieslaarI17, author = {Ibraheem Frieslaar and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Investigating the electromagnetic side channel leakage from a Raspberry Pi}, booktitle = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg, South Africa, August 16-17, 2017}, pages = {24--31}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISSA.2017.8251771}, doi = {10.1109/ISSA.2017.8251771}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/FrieslaarI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HaugerO17, author = {Werner K. Hauger and Martin S. Olivier}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Forensic attribution in NoSQL databases}, booktitle = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg, South Africa, August 16-17, 2017}, pages = {74--82}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISSA.2017.8251777}, doi = {10.1109/ISSA.2017.8251777}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/HaugerO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KenyonE17, author = {David Kenyon and Jan H. P. Eloff}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Big data science for predicting insurance claims fraud}, booktitle = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg, South Africa, August 16-17, 2017}, pages = {40--47}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISSA.2017.8251773}, doi = {10.1109/ISSA.2017.8251773}, timestamp = {Wed, 17 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KenyonE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MnjamaFI17, author = {Javan Mnjama and Greg Foster and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {A privacy and security threat assessment framework for consumer health wearables}, booktitle = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg, South Africa, August 16-17, 2017}, pages = {66--73}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISSA.2017.8251776}, doi = {10.1109/ISSA.2017.8251776}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MnjamaFI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MoutonNLV17, author = {Francois Mouton and Alastair Nottingham and Louise Leenen and H. S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Underlying finite state machine for the social engineering attack detection model}, booktitle = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg, South Africa, August 16-17, 2017}, pages = {98--105}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISSA.2017.8251781}, doi = {10.1109/ISSA.2017.8251781}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MoutonNLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MoutonTM17, author = {Francois Mouton and Marcel Teixeira and Thomas Meyer}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Benchmarking a mobile implementation of the social engineering prevention training tool}, booktitle = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg, South Africa, August 16-17, 2017}, pages = {106--116}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISSA.2017.8251782}, doi = {10.1109/ISSA.2017.8251782}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MoutonTM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MpofuS17, author = {Nkosinathi Mpofu and Wynand J. C. van Staden}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Evaluating the severity of trust to identity- management-as-a-service}, booktitle = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg, South Africa, August 16-17, 2017}, pages = {83--89}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISSA.2017.8251778}, doi = {10.1109/ISSA.2017.8251778}, timestamp = {Wed, 17 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MpofuS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/PelteretO17, author = {Marc Pelteret and Jacques Ophoff}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Organizational information privacy strategy and the impact of the PoPI act}, booktitle = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg, South Africa, August 16-17, 2017}, pages = {56--65}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISSA.2017.8251775}, doi = {10.1109/ISSA.2017.8251775}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/PelteretO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/PennefatherI17, author = {Sean Pennefather and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Design and application of link: {A} {DSL} for network frame manipulation}, booktitle = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg, South Africa, August 16-17, 2017}, pages = {48--55}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISSA.2017.8251774}, doi = {10.1109/ISSA.2017.8251774}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/PennefatherI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/RenaudZ17, author = {Karen Renaud and Verena Zimmermann}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Enriched nudges lead to stronger password replacements ... but implement mindfully}, booktitle = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg, South Africa, August 16-17, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISSA.2017.8251779}, doi = {10.1109/ISSA.2017.8251779}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/RenaudZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/VeigaVPA17, author = {Ad{\'{e}}le da Veiga and Ruthea Vorster and Colin Pilkington and Hanifa Abdullah}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Compliance with the protection of personal information act and consumer privacy expectations: {A} comparison between the retail and medical aid industry}, booktitle = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg, South Africa, August 16-17, 2017}, pages = {16--23}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISSA.2017.8251784}, doi = {10.1109/ISSA.2017.8251784}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/VeigaVPA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/VumoSK17, author = {Ambrosio Patricio Vumo and Josef Spillner and Stefan K{\"{o}}psell}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Analysis of Mozambican websites: How do they protect their users?}, booktitle = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg, South Africa, August 16-17, 2017}, pages = {90--97}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISSA.2017.8251780}, doi = {10.1109/ISSA.2017.8251780}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/VumoSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2017, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg, South Africa, August 16-17, 2017}, publisher = {{IEEE}}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8240063/proceeding}, isbn = {978-1-5386-0545-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/DelportGS16, author = {Petrus M. J. Delport and Mariana Gerber and Nader Sohrabi Safa}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {An interactive visual library model to improve awareness in handling of business information}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {18--26}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802924}, doi = {10.1109/ISSA.2016.7802924}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/DelportGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ElaswadJ16, author = {Othoman Elaswad and Christian Damsgaard Jensen}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Identity management for e-government Libya as a case study}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {106--113}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802936}, doi = {10.1109/ISSA.2016.7802936}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/ElaswadJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/FaniSG16, author = {Noluvuyo Fani and Rossouw von Solms and Mariana Gerber}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {A framework towards governing "Bring Your Own Device in SMMEs"}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802922}, doi = {10.1109/ISSA.2016.7802922}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/FaniSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/FrauensteinF16, author = {Edwin Donald Frauenstein and Stephen V. Flowerday}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Social network phishing: Becoming habituated to clicks and ignorant to threats?}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {98--105}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802935}, doi = {10.1109/ISSA.2016.7802935}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/FrauensteinF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HerbertI16, author = {Alan Herbert and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Adaptable exploit detection through scalable NetFlow analysis}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {121--128}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802938}, doi = {10.1109/ISSA.2016.7802938}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/HerbertI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KockF16, author = {Ryan De Kock and Lynn Ann Futcher}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Mobile device usage in higher education institutions in South Africa}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {27--34}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802925}, doi = {10.1109/ISSA.2016.7802925}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/KockF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MasangoMNM16, author = {Mfundo Glenn Masango and Francois Mouton and Alastair Nottingham and Jabu Mtsweni}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Context Aware Mobile Application for mobile devices}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {85--90}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802933}, doi = {10.1109/ISSA.2016.7802933}, timestamp = {Sat, 30 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MasangoMNM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MejaeleO16, author = {Lineo Mejaele and Elisha Oketch Ochola}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Effect of varying node mobility in the analysis of black hole attack on {MANET} reactive routing protocols}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {62--68}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802930}, doi = {10.1109/ISSA.2016.7802930}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MejaeleO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MonamoMT16, author = {Patrick Monamo and Vukosi Marivate and Bheki Twala}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Unsupervised learning for robust Bitcoin fraud detection}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {129--134}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802939}, doi = {10.1109/ISSA.2016.7802939}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MonamoMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MotaraI16, author = {Yusuf Moosa Motara and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {{SHA-1} and the Strict Avalanche Criterion}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {35--40}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802926}, doi = {10.1109/ISSA.2016.7802926}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MotaraI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OlisahO16, author = {Chollette C. Olisah and Peter Ogedebe}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Recognizing surgically altered faces using local edge gradient Gabor magnitude pattern}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {114--120}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802937}, doi = {10.1109/ISSA.2016.7802937}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/OlisahO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/RudmanI16, author = {Lauren Rudman and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Dridex: Analysis of the traffic and automatic generation of IOCs}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {77--84}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802932}, doi = {10.1109/ISSA.2016.7802932}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/RudmanI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SamuelP16, author = {J. N. Samuel and Warren P. Du Plessis}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Specific emitter identification for enhanced access control security}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {41--47}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802927}, doi = {10.1109/ISSA.2016.7802927}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SamuelP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ScharnickGF16, author = {Nicholas Scharnick and Mariana Gerber and Lynn Futcher}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Review of data storage protection approaches for {POPI} compliance}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {48--55}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802928}, doi = {10.1109/ISSA.2016.7802928}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/ScharnickGF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/StadenP16, author = {Wynand J. C. van Staden and Etienne van der Poel}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Team formation in digital forensics}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {91--97}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802934}, doi = {10.1109/ISSA.2016.7802934}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/StadenP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SwartzV16, author = {Paulus Swartz and Ad{\'{e}}le da Veiga}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {PoPI Act - opt-in and opt-out compliance from a data value chain perspective: {A} South African insurance industry experiment}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {9--17}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802923}, doi = {10.1109/ISSA.2016.7802923}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SwartzV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/VorsterHI16, author = {Johannes S. Vorster and Renier P. van Heerden and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {The pattern-richness of Graphical passwords}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {69--76}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802931}, doi = {10.1109/ISSA.2016.7802931}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/VorsterHI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/WojuolaMS16, author = {Olanrewaju B. Wojuola and Stanley H. Mneney and Viranjay M. Srivastava}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {{CDMA} in signal encryption and information security}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {56--61}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802929}, doi = {10.1109/ISSA.2016.7802929}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/WojuolaMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2016, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7786562/proceeding}, isbn = {978-1-5090-2473-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BothaES15, author = {J. G. Botha and Mariki M. Eloff and I. Swart}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {The effects of the PoPI Act on small and medium enterprises in South Africa}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335054}, doi = {10.1109/ISSA.2015.7335054}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/BothaES15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Govender15, author = {Irene Govender}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Mapping 'Security Safeguard' Requirements in a data privacy legislation to an international privacy framework: {A} compliance methodology}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335062}, doi = {10.1109/ISSA.2015.7335062}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Govender15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GreavesC15, author = {Brian Greaves and Marijke Coetzee}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Access control for local personal smart spaces}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335056}, doi = {10.1109/ISSA.2015.7335056}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/GreavesC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HaugerO15, author = {Werner K. Hauger and Martin S. Olivier}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {The state of database forensic research}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335071}, doi = {10.1109/ISSA.2015.7335071}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/HaugerO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HerreraJ15, author = {Andrea Herrera and Lech J. Janczewski}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Cloud supply chain resilience}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--9}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335076}, doi = {10.1109/ISSA.2015.7335076}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/HerreraJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/InglesVV15, author = {Melissa Ingles and Aleksandar Valjarevic and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Evaluation and analysis of a software prototype for guidance and implementation of a standardized digital forensic investigation process}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335052}, doi = {10.1109/ISSA.2015.7335052}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/InglesVV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/JordaanB15, author = {Jason Jordaan and Karen L. Bradshaw}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {The current state of digital forensic practitioners in South Africa}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--9}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335068}, doi = {10.1109/ISSA.2015.7335068}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/JordaanB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KebandeV15, author = {Victor R. Kebande and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Adding event reconstruction to a Cloud Forensic Readiness model}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--9}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335050}, doi = {10.1109/ISSA.2015.7335050}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/KebandeV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/LubbeO15, author = {Luke Lubbe and Martin Oliver}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Beacons and their uses for digital forensics purposes}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335074}, doi = {10.1109/ISSA.2015.7335074}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/LubbeO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MahopoAM15, author = {Bessy Mahopo and Hanifa Abdullah and Mathias Mujinga}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {A formal qualitative risk management approach for {IT} security}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335053}, doi = {10.1109/ISSA.2015.7335053}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MahopoAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MasvosvereV15, author = {D. J. E. Masvosvere and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {A model for the design of next generation e-supply chain digital forensic readiness tools}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--9}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335075}, doi = {10.1109/ISSA.2015.7335075}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MasvosvereV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MayayiseO15, author = {Thembekile O. Mayayise and Isaac Olusegun Osunmakinde}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Robustness of computational intelligent assurance models when assessing e-Commerce sites}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335067}, doi = {10.1109/ISSA.2015.7335067}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MayayiseO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MerweS15, author = {Mc Donald Van der Merwe and Wynand J. C. van Staden}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Unsolicited Short Message Service marketing: {A} preliminary investigation into individual acceptance, perceptions of content, and privacy concerns}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335072}, doi = {10.1109/ISSA.2015.7335072}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MerweS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MooiB15, author = {Roderick Mooi and Reinhardt A. Botha}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Prerequisites for building a Computer Security Incident Response capability}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335057}, doi = {10.1109/ISSA.2015.7335057}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MooiB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Morkel15, author = {Tayana Morkel}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Self-sanitization of digital images using steganography}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335073}, doi = {10.1109/ISSA.2015.7335073}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Morkel15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Mtsweni15, author = {Jabu Mtsweni}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Analyzing the security posture of South African websites}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335063}, doi = {10.1109/ISSA.2015.7335063}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Mtsweni15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MunteanRIE15, author = {Paul Muntean and Mustafizur Rahman and Andreas Ibing and Claudia Eckert}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {SMT-constrained symbolic execution engine for integer overflow detection in {C} code}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335070}, doi = {10.1109/ISSA.2015.7335070}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MunteanRIE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NairHM15, author = {Kishor Krishnan Nair and Albert Helberg and Johan Van Der Merwe}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Intrusion detection in Bluetooth enabled mobile phones}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335048}, doi = {10.1109/ISSA.2015.7335048}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/NairHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NaudeD15, author = {Jared Naude and Lynette Drevin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {The adversarial threat posed by the {NSA} to the integrity of the internet}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335060}, doi = {10.1109/ISSA.2015.7335060}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/NaudeD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Olivier15, author = {Martin S. Olivier}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Towards a digital forensic science}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335077}, doi = {10.1109/ISSA.2015.7335077}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Olivier15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Padayachee15, author = {Keshnee Padayachee}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {A framework of opportunity-reducing techniques to mitigate the insider threat}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335064}, doi = {10.1109/ISSA.2015.7335064}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Padayachee15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/PieterseOH15, author = {Heloise Pieterse and Martin S. Olivier and Renier P. van Heerden}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Playing hide-and-seek: Detecting the manipulation of Android Timestamps}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335065}, doi = {10.1109/ISSA.2015.7335065}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/PieterseOH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/RamotsoelaH15, author = {T. D. Ramotsoela and Gerhard P. Hancke}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Data aggregation using homomorphic encryption in wireless sensor networks}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335058}, doi = {10.1109/ISSA.2015.7335058}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/RamotsoelaH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/RenaudHS15, author = {Karen Renaud and Andrew Hoskins and Rossouw von Solms}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Biometric identification: Are we ethically ready?}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335051}, doi = {10.1109/ISSA.2015.7335051}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/RenaudHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/RudmanI15, author = {Lauren Rudman and Barry V. W. Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Characterization and analysis of {NTP} amplification based DDoS attacks}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335069}, doi = {10.1109/ISSA.2015.7335069}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/RudmanI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SavolaSEAS15, author = {Reijo M. Savola and Pekka Savolainen and Antti Evesti and Habtamu Abie and Markus Sihvonen}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Risk-driven security metrics development for an e-health IoT application}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335061}, doi = {10.1109/ISSA.2015.7335061}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SavolaSEAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SkolmenG15, author = {Dayne Edward Skolmen and Mariana Gerber}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Protection of Personal Information in the South African Cloud Computing environment: {A} framework for Cloud Computing adoption}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--10}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335049}, doi = {10.1109/ISSA.2015.7335049}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SkolmenG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SmithC15, author = {Gregory Stuart Smith and Marijke Coetzee}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {{AFA-RFID:} Physical layer authentication for passive {RFID} tags}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335078}, doi = {10.1109/ISSA.2015.7335078}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SmithC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Solms15, author = {Sun{\'{e}} von Solms}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {An investigation into credit card information disclosure through Point of Sale purchases}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335055}, doi = {10.1109/ISSA.2015.7335055}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Solms15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ToitE15, author = {Jaco du Toit and Ian Ellefsen}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Location aware mobile device management}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335059}, doi = {10.1109/ISSA.2015.7335059}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ToitE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/VenterLCE15, author = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Introduction}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335042}, doi = {10.1109/ISSA.2015.7335042}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/VenterLCE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Watney15, author = {Murdoch Watney}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {State-on-nationals' electronic communication surveillance in South Africa: {A} murky legal landscape to navigate?}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335047}, doi = {10.1109/ISSA.2015.7335047}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Watney15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/WrenchI15, author = {Peter M. Wrench and Barry V. W. Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Towards a {PHP} webshell taxonomy using deobfuscation-assisted similarity analysis}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335066}, doi = {10.1109/ISSA.2015.7335066}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/WrenchI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2015, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7328027/proceeding}, isbn = {978-1-4799-7755-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/AllyBN14, author = {Sayed Enayat Sayed Ally and Craig Blewett and Brett van Niekerk}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Facebook: The risk-taking attitude amongst Emerging Adults}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950515}, doi = {10.1109/ISSA.2014.6950515}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/AllyBN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Castillo14, author = {Juan{-}Camilo Castillo}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {The Mexican Cartels' employment of Inform and Influence Activities {(IIA)} as tools of asymmetrical warfare}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950512}, doi = {10.1109/ISSA.2014.6950512}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Castillo14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/CoertzeS14, author = {Jacques Coertze and Rossouw von Solms}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {The murky waters of {IT} governance}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950498}, doi = {10.1109/ISSA.2014.6950498}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/CoertzeS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/FrauensteinS14, author = {Edwin Donald Frauenstein and Rossouw von Solms}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Combatting phishing: {A} holistic human approach}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--10}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950508}, doi = {10.1109/ISSA.2014.6950508}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/FrauensteinS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HaffejeeI14, author = {Jameel Haffejee and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Testing antivirus engines to determine their effectiveness as a security layer}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950496}, doi = {10.1109/ISSA.2014.6950496}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/HaffejeeI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HaugerO14, author = {Werner K. Hauger and Martin S. Olivier}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {The role of triggers in database forensics}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--7}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950506}, doi = {10.1109/ISSA.2014.6950506}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/HaugerO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HindeO14, author = {Charlie Hinde and Jacques Ophoff}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Privacy: {A} review of publication trends}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--7}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950499}, doi = {10.1109/ISSA.2014.6950499}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/HindeO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KearneyK14, author = {Wayne D. Kearney and Hennie A. Kruger}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Considering the influence of human trust in practical social engineering exercises}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950509}, doi = {10.1109/ISSA.2014.6950509}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/KearneyK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KhanM14, author = {Zubeida Casmod Khan and Thulani Mashiane}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {An analysis of Facebook's graph search}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950517}, doi = {10.1109/ISSA.2014.6950517}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/KhanM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Kritzinger14, author = {Elmarie Kritzinger}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Online safety in South Africa - {A} cause for growing concern}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--7}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950502}, doi = {10.1109/ISSA.2014.6950502}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Kritzinger14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KuntzeRH14, author = {Nicolai Kuntze and Carsten Rudolph and Oliver Hanka}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Security foundation for a distributed cabin core architecture}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950487}, doi = {10.1109/ISSA.2014.6950487}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/KuntzeRH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MadzimaMA14, author = {Kudakwashe Madzima and Moses Moyo and Hanifa Abdullah}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Is bring your own device an institutional information security risk for small-scale business organisations?}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950497}, doi = {10.1109/ISSA.2014.6950497}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MadzimaMA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MirzaSPN14, author = {Abdul Mirza and Makhamisa Senekane and Francesco Petruccione and Brett van Niekerk}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Suitability of quantum cryptography for national facilities}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--7}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950513}, doi = {10.1109/ISSA.2014.6950513}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MirzaSPN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MogaleGCS14, author = {Miemie Mogale and Mariana Gerber and Mariana Carroll and Rossouw von Solms}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Information Security Assurance Model {(ISAM)} for an Examination Paper Preparation Process}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--10}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950505}, doi = {10.1109/ISSA.2014.6950505}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MogaleGCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MoutonMLV14, author = {Francois Mouton and Mercia M. Malan and Louise Leenen and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Social engineering attack framework}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--9}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950510}, doi = {10.1109/ISSA.2014.6950510}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MoutonMLV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MpofuS14, author = {Nkosinathi Mpofu and Wynand J. C. van Staden}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {A survey of trust issues constraining the growth of Identity Management-as-a-Service(IdMaaS)}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950490}, doi = {10.1109/ISSA.2014.6950490}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MpofuS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MumbaV14, author = {Emilio Raymond Mumba and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Mobile forensics using the harmonised digital forensic investigation process}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--10}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950491}, doi = {10.1109/ISSA.2014.6950491}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MumbaV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OphoffR14, author = {Jacques Ophoff and Mark Robinson}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Exploring end-user smartphone security awareness within a South African context}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--7}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950500}, doi = {10.1109/ISSA.2014.6950500}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/OphoffR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/PennefatherI14, author = {Sean Pennefather and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {An exploration of geolocation and traffic visualisation using network flows}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950507}, doi = {10.1109/ISSA.2014.6950507}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/PennefatherI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Plessis14, author = {Warren P. Du Plessis}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Software-defined radio {(SDR)} as a mechanism for exploring cyber-electronic warfare {(EW)} collaboration}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950516}, doi = {10.1109/ISSA.2014.6950516}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Plessis14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ReidN14, author = {Rayne Reid and Johan Van Niekerk}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {From information security to cyber security cultures}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--7}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950492}, doi = {10.1109/ISSA.2014.6950492}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/ReidN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ReidNR14, author = {Rayne Reid and Johan Van Niekerk and Karen Renaud}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Information security culture: {A} general living systems theory perspective}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950493}, doi = {10.1109/ISSA.2014.6950493}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/ReidNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Robertson14, author = {Jaco Robertson}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Integrity of a common operating picture in military situational awareness}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--7}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950514}, doi = {10.1109/ISSA.2014.6950514}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Robertson14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SavolaK14, author = {Reijo M. Savola and Markku Kyl{\"{a}}np{\"{a}}{\"{a}}}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Security objectives, controls and metrics development for an Android smartphone application}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950501}, doi = {10.1109/ISSA.2014.6950501}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SavolaK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SchnarzFWS14, author = {Pierre Schnarz and Clemens Fischer and Joachim Wietzke and Ingo Stengel}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {On a domain block based mechanism to mitigate DoS attacks on shared caches in asymmetric multiprocessing multi operating systems}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950494}, doi = {10.1109/ISSA.2014.6950494}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SchnarzFWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Staden14, author = {Wynand J. C. van Staden}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {An investigation into reducing third party privacy breaches during the investigation of cybercrime}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950503}, doi = {10.1109/ISSA.2014.6950503}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Staden14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SwartIG14, author = {Ignus P. Swart and Barry Irwin and Marthie Grobler}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Towards a platform to visualize the state of South Africa's information security}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950511}, doi = {10.1109/ISSA.2014.6950511}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SwartIG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/TekeniTB14, author = {Luzuko Tekeni and Kerry{-}Lynn Thomson and Reinhardt A. Botha}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Concerns regarding service authorization by {IP} address using eduroam}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950495}, doi = {10.1109/ISSA.2014.6950495}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/TekeniTB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/TrenwithV14, author = {Philip M. Trenwith and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {A digital forensic model for providing better data provenance in the cloud}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950489}, doi = {10.1109/ISSA.2014.6950489}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/TrenwithV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ValjarevicVI14, author = {Aleksandar Valjarevic and Hein S. Venter and Melissa Ingles}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Towards a prototype for guidance and implementation of a standardized digital forensic investigation process}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950488}, doi = {10.1109/ISSA.2014.6950488}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ValjarevicVI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/VenterLCE14, author = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Introduction}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950482}, doi = {10.1109/ISSA.2014.6950482}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/VenterLCE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/WrenchI14, author = {Peter M. Wrench and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Towards a sandbox for the deobfuscation and dissection of {PHP} malware}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950504}, doi = {10.1109/ISSA.2014.6950504}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/WrenchI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2014, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6940061/proceeding}, isbn = {978-1-4799-3384-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Al-MutairiW13, author = {Abdulrahman Al{-}Mutairi and Stephen D. Wolthusen}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {An analysis of service degradation attacks against real-time {MPLS} networks}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641057}, doi = {10.1109/ISSA.2013.6641057}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/issa/Al-MutairiW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/CoertzeS13, author = {Jacques Coertze and Rossouw von Solms}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {A software gateway to affordable and effective Information Security Governance in SMMEs}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641035}, doi = {10.1109/ISSA.2013.6641035}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/CoertzeS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/EsanNO13, author = {Omobayo A. Esan and Seleman M. Ngwira and Isaac Olusegun Osunmakinde}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Bimodal biometrics for financial infrastructure security}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641045}, doi = {10.1109/ISSA.2013.6641045}, timestamp = {Mon, 29 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/EsanNO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/FahdiCF13, author = {M. Al Fahdi and Nathan L. Clarke and Steven M. Furnell}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Challenges to digital forensics: {A} survey of researchers {\&} practitioners attitudes and opinions}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641058}, doi = {10.1109/ISSA.2013.6641058}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/FahdiCF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HaarGP13, author = {Helen van de Haar and Darelle van Greunen and Dalenca Pottas}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {The characteristics of a biometric}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641037}, doi = {10.1109/ISSA.2013.6641037}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/HaarGP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HerbertI13, author = {Alan Herbert and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {A kernel-driven framework for high performance internet routing simulation}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641048}, doi = {10.1109/ISSA.2013.6641048}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/HerbertI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HillebrandC13, author = {Channel Hillebrand and Marijke Coetzee}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Towards Reputation-as-a-Service}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641047}, doi = {10.1109/ISSA.2013.6641047}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/HillebrandC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HunterIS13, author = {Samuel Oswald Hunter and Barry Irwin and Etienne Stalmans}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Real-time distributed malicious traffic monitoring for honeypots and network telescopes}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--9}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641050}, doi = {10.1109/ISSA.2013.6641050}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/HunterIS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/JacobsAI13, author = {Pierre Jacobs and Alapan Arnab and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Classification of Security Operation Centers}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641054}, doi = {10.1109/ISSA.2013.6641054}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/JacobsAI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KarieV13, author = {Nickson M. Karie and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Towards a framework for enhancing potential digital evidence presentation}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641039}, doi = {10.1109/ISSA.2013.6641039}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/KarieV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MayayiseO13, author = {Thembekile O. Mayayise and Isaac Olusegun Osunmakinde}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {A compliant assurance model for assessing the trustworthiness of cloud-based e-commerce systems}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641042}, doi = {10.1109/ISSA.2013.6641042}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MayayiseO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MoutonE13, author = {Jean Mouton and Ian Ellefsen}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {The identification of information sources to aid with Critical Information Infrastructure Protection}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641038}, doi = {10.1109/ISSA.2013.6641038}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MoutonE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MoutonMV13, author = {Francois Mouton and Mercia M. Malan and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Social engineering from a normative ethics perspective}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641064}, doi = {10.1109/ISSA.2013.6641064}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MoutonMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MoyoAN13, author = {Moses Moyo and Hanifa Abdullah and Rita C. Nienaber}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Information security risk management in small-scale organisations: {A} case study of secondary schools computerised information systems}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641062}, doi = {10.1109/ISSA.2013.6641062}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MoyoAN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NkosiTA13, author = {Lucky Nkosi and Paul Tarwireyi and Matthew O. Adigun}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Insider threat detection model for the cloud}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641040}, doi = {10.1109/ISSA.2013.6641040}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/NkosiTA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NottinghamI13, author = {Alastair Nottingham and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {A high-level architecture for efficient packet trace analysis on {GPU} co-processors}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641052}, doi = {10.1109/ISSA.2013.6641052}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/NottinghamI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OcholaEP13, author = {Elisha O. Ochola and Mariki M. Eloff and John A. van der Poll}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Democratic detection of malicious behaviour in {MANET:} {A} voting process}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641051}, doi = {10.1109/ISSA.2013.6641051}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/OcholaEP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OmelezeV13, author = {Stacey Omeleze and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Testing the harmonised digital forensic investigation process model-using an Android mobile phone}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641063}, doi = {10.1109/ISSA.2013.6641063}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/OmelezeV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Padayachee13, author = {Keshnee Padayachee}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {A conceptual opportunity-based framework to mitigate the insider threat}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641060}, doi = {10.1109/ISSA.2013.6641060}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Padayachee13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/PieterseO13, author = {Heloise Pieterse and Martin S. Olivier}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Security steps for smartphone users}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641036}, doi = {10.1109/ISSA.2013.6641036}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/PieterseO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/RenaudKNM13, author = {Karen Renaud and Demetris Kennes and Johan Van Niekerk and Joe Maguire}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {{SNIPPET:} Genuine knowledge-based authentication}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641059}, doi = {10.1109/ISSA.2013.6641059}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/RenaudKNM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SalvaZ13, author = {S{\'{e}}bastien Salva and Stassia R. Zafimiharisoa}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Data vulnerability detection by security testing for Android applications}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641043}, doi = {10.1109/ISSA.2013.6641043}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SalvaZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SavolaVESKK13, author = {Reijo M. Savola and Teemu V{\"{a}}is{\"{a}}nen and Antti Evesti and Pekka Savolainen and Juha Kemppainen and Marko Kokemaki}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Toward risk-driven security measurement for Android smartphone platforms}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641049}, doi = {10.1109/ISSA.2013.6641049}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SavolaVESKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Schoeman13, author = {Adam Schoeman}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Amber: {A} zero-interaction honeypot and network enforcer with modular intelligence}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641053}, doi = {10.1109/ISSA.2013.6641053}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Schoeman13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ShavaG13, author = {Fungai Bhunu Shava and Darelle van Greunen}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Factors affecting user experience with security features: {A} case study of an academic institution in Namibia}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641061}, doi = {10.1109/ISSA.2013.6641061}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ShavaG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SibiyaFV13, author = {George Sibiya and Thomas Fogwill and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Selection and ranking of remote hosts for digital forensic investigation in a Cloud environment}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641044}, doi = {10.1109/ISSA.2013.6641044}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SibiyaFV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SwartGI13, author = {Ignus P. Swart and Marthie Grobler and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Visualization of a data leak}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641046}, doi = {10.1109/ISSA.2013.6641046}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SwartGI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/TrenwithV13, author = {Philip M. Trenwith and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Digital forensic readiness in the cloud}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641055}, doi = {10.1109/ISSA.2013.6641055}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/TrenwithV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ValjarevicV13, author = {Aleksandar Valjarevic and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Implementation guidelines for a harmonised digital forensic investigation readiness process model}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--9}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641041}, doi = {10.1109/ISSA.2013.6641041}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ValjarevicV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/VenterLC13, author = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Introduction}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641030}, doi = {10.1109/ISSA.2013.6641030}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/VenterLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/WestonW13, author = {Peter Weston and Stephen D. Wolthusen}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Forensic entropy analysis of microsoft windows storage volumes}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641056}, doi = {10.1109/ISSA.2013.6641056}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/WestonW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2013, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6621627/proceeding}, isbn = {978-1-4799-0808-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/AzeezV12, author = {Nureni Ayofe Azeez and Isabella Margarethe Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Towards achieving scalability and interoperability in a triple-domain grid-based environment {(3DGBE)}}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--10}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320440}, doi = {10.1109/ISSA.2012.6320440}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/AzeezV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BreitingerB12, author = {Frank Breitinger and Harald Baier}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Properties of a similarity preserving hash function and their realization in sdhash}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320445}, doi = {10.1109/ISSA.2012.6320445}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/BreitingerB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/CorregedorS12, author = {Manuel Corregedor and Sebastiaan H. von Solms}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {{ATE:} Anti-malware technique evaluator}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320444}, doi = {10.1109/ISSA.2012.6320444}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/CorregedorS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Croft12, author = {Neil J. Croft}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {On forensics: {A} silent {SMS} attack}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--4}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320454}, doi = {10.1109/ISSA.2012.6320454}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Croft12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GunduF12, author = {Tapiwa Gundu and Stephen Flowerday}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {The enemy within: {A} behavioural intention model and an information security awareness process}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320437}, doi = {10.1109/ISSA.2012.6320437}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/GunduF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HunterSIR12, author = {Samuel O. Hunter and Etienne Stalmans and Barry Irwin and John Richter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Remote fingerprinting and multisensor data fusion}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320449}, doi = {10.1109/ISSA.2012.6320449}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/HunterSIR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Irwin12, author = {Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {A network telescope perspective of the Conficker outbreak}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320455}, doi = {10.1109/ISSA.2012.6320455}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Irwin12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Jordaan12, author = {Jason Jordaan}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {A Sample of digital forensic quality assurance in the South African criminal justice system}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320431}, doi = {10.1109/ISSA.2012.6320431}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Jordaan12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KarieV12, author = {Nickson M. Karie and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Measuring semantic similarity between digital forensics terminologies using web search engines}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--9}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320448}, doi = {10.1109/ISSA.2012.6320448}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/KarieV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KayemDH12, author = {Anne V. D. M. Kayem and Azhar Deshai and Stuart Hammer}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {On anonymizing social network graphs}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320456}, doi = {10.1109/ISSA.2012.6320456}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/KayemDH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KroezeO12, author = {Christien Kroeze and Martin S. Olivier}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Gamifying authentication}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320439}, doi = {10.1109/ISSA.2012.6320439}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/KroezeO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/LengHMM12, author = {Xuefei Leng and Gerhard P. Hancke and Keith Mayes and Konstantinos Markantonakis}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Tag Group Authentication Using Bit-Collisions}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320447}, doi = {10.1109/ISSA.2012.6320447}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/LengHMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NjengaN12, author = {Kennedy Njenga and Sifiso Ndlovu}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {On privacy calculus and underlying consumer concerns influencing mobile banking subscriptions}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--9}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320453}, doi = {10.1109/ISSA.2012.6320453}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/NjengaN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NtlatywaBH12, author = {Phumezo Ntlatywa and Reinhardt A. Botha and Bertram Haskins}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Claimed vs observed information disclosure on social networking sites}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320443}, doi = {10.1109/ISSA.2012.6320443}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/NtlatywaBH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OehriT12, author = {Caroline Oehri and Stephanie Teufel}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Social media security culture}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--5}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320436}, doi = {10.1109/ISSA.2012.6320436}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/OehriT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OkereNC12, author = {Irene Okere and Johan Van Niekerk and Mariana Carroll}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Assessing information security culture: {A} critical analysis of current approaches}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320442}, doi = {10.1109/ISSA.2012.6320442}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/OkereNC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/PieterseO12, author = {Heloise Pieterse and Martin S. Olivier}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Android botnets on the rise: Trends and characteristics}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--5}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320432}, doi = {10.1109/ISSA.2012.6320432}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/PieterseO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/PooeL12, author = {Antonio Pooe and Les Labuschagne}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {A conceptual model for digital forensic readiness}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320452}, doi = {10.1109/ISSA.2012.6320452}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/PooeL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/PotgieterN12, author = {Marius Potgieter and Johan Van Niekerk}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {The use of computer vision technologies to augment human monitoring of secure computing facilities}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320450}, doi = {10.1109/ISSA.2012.6320450}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/PotgieterN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/RamaFB12, author = {Sobhana Rama and Stephen Flowerday and Duane Boucher}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Information confidentiality and the Chinese Wall Model in Government tender fraud}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320438}, doi = {10.1109/ISSA.2012.6320438}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/RamaFB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Savola12, author = {Reijo M. Savola}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Strategies for security measurement objective decomposition}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320434}, doi = {10.1109/ISSA.2012.6320434}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Savola12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SeegerW12, author = {Mark M. Seeger and Stephen D. Wolthusen}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {A model for partially asynchronous observation of malicious behavior}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320435}, doi = {10.1109/ISSA.2012.6320435}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SeegerW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SibiyaVNF12, author = {George Sibiya and Hein S. Venter and Sipho Ngobeni and Thomas Fogwill}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Guidelines for procedures of a harmonised digital forensic process in network forensics}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320451}, doi = {10.1109/ISSA.2012.6320451}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SibiyaVNF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/StalmansHI12, author = {Etienne Stalmans and Samuel O. Hunter and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Geo-spatial autocorrelation as a metric for the detection of Fast-Flux botnet domains}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320433}, doi = {10.1109/ISSA.2012.6320433}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/StalmansHI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ToitK12, author = {Tiny du Toit and Hennie A. Kruger}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Filtering spam e-mail with Generalized Additive Neural Networks}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320446}, doi = {10.1109/ISSA.2012.6320446}, timestamp = {Tue, 11 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/ToitK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ValjarevicV12, author = {Aleksandar Valjarevic and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Harmonised digital forensic investigation process model}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--10}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320441}, doi = {10.1109/ISSA.2012.6320441}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ValjarevicV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/VenterLC12, author = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Introduction}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320426}, doi = {10.1109/ISSA.2012.6320426}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/VenterLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2012, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6305018/proceeding}, isbn = {978-1-4673-2160-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/AllamF11, author = {Sean Allam and Stephen Flowerday}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {An adaptation of the awareness boundary model towards smartphone security}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/36\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/AllamF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BangerterKSU11, author = {Endre Bangerter and Stephan Krenn and Matrial Seifriz and Ulrich Ultes{-}Nitsche}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {cPLC - {A} Cryptographic Programming Language and Compiler}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/50\_paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BangerterKSU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BeyersOH11, author = {Hector Beyers and Martin S. Olivier and Gerhard P. Hancke}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {An approach to examine the Metadata and Data of a database Management System by making use of a forensic comparison tool}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Beyers\_Olivier\_Hancke.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BeyersOH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BorgBL11, author = {Anton Borg and Martin Boldt and Niklas Lavesson}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Informed Software Installation Through License Agreement Categorization}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/91\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BorgBL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BoucherF11, author = {Duane Boucher and Stephen Flowerday}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Privacy: In pursuit of Information security awareness}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Baucher\_Flowerday.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BoucherF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BurkeO11, author = {Ivan Daniel Burke and Martin S. Olivier}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Analysing the fairness of trust-based Mobile Ad Hoc Network protocols}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/37\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BurkeO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/CarrollKM11, author = {Mariana Carroll and Paula Kotz{\'{e}} and Alta van der Merwe}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Secure Cloud Computing: Benefits, Risks and Controls}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/13\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/CarrollKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Chan11, author = {Ka Fai Peter Chan}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Secret sharing in audio steganography}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Chan.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Chan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/CoertzeNS11, author = {Jacques Coertze and Johan Van Niekerk and Rossouw von Solms}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A web-based information security governance toolbox for small-to-medium enterprises in Southern Africa}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/04\_Paper.pdf}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/CoertzeNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/CorregedorS11, author = {Manuel Corregedor and Sebastiaan H. von Solms}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Implementing Rootkits to Address Operating System Vulnerabilities}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/18\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/CorregedorS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/DelportKO11, author = {Waldo Delport and Michael K{\"{o}}hn and Martin S. Olivier}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Isolating a cloud instance for a digital forensic investigation}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Delport\_Olivier\_Kohn.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/DelportKO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Egan11, author = {Shaun Egan}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {An Evaluation of Lightweight Classification Methods for Identifying Malicious URLs}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/49\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Egan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/FoucheT11, author = {Nico Pieter Fouche and Kerry{-}Lynn Thomson}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Exploring the Human Dimension of {TETRA}}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/39\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/FoucheT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GalpinF11, author = {Ryan Galpin and Stephen Flowerday}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Online Social Networks: Enhancing user trust through effective controls and identity management}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/16\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GalpinF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GossB11, author = {Ryan Gavin Goss and Reinhardt A. Botha}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Traffic Management in Next Generation Service Provider Networks - Are We There Yet?}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/38\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GossB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GroblerDNL11, author = {Marthie Grobler and Zama Dlamini and Sipho Ngobeni and Aubrey Labuschagne}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Towards a Cyber security aware rural community}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Grobler.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GroblerDNL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HunterI11, author = {Samuel O. Hunter and Barry Irwin}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Tartarus: {A} honeypot based malware tracking and mitigation framework}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Hunter.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/HunterI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/IsherwoodC11, author = {Donovan Isherwood and Marijke Coetzee}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Enhancing Digital Business Ecosystem Trust and Reputation with Centrality Measures}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/57\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/IsherwoodC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KarokolaKY11, author = {Geoffrey Karokola and Stewart Kowalski and Louise Yngstr{\"{o}}m}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Secure e-Government Services: Towards {A} Framework for Integrating {IT} Security Services into e-Government Maturity Models}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/31\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KarokolaKY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KayemMA11, author = {Anne V. D. M. Kayem and Patrick Martin and Selim G. Akl}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/07\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KayemMA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KhanyileTD11, author = {Nontokozo P. Khanyile and Jules{-}Raymond Tapamo and Erick Dube}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A Comparative Study of Fingerprint Thinning algorithms}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Khanyile\_Tapamo\_Dube.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KhanyileTD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KoletkaH11, author = {Robert Koletka and Andrew Hutchison}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {An Architecture for Secure Searchable Cloud Storage}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/33\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KoletkaH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KrugerFDS11, author = {Hennie A. Kruger and Stephen Flowerday and Lynette Drevin and Tjaart Steyn}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {An assessment of the role of cultural factors in information security awareness}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/93\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KrugerFDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/LabuschagneVB11, author = {Aubrey Labuschagne and Namosha Veerasamy and Ivan Burke}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Design of cyber security awareness game utilizing a social media framework}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/79\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/LabuschagneVB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MabutoV11, author = {Enos K. Mabuto and Hein S. Venter}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {State of the Art of Digital Forensic Techniques}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Mabuto\_Venter.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MabutoV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OcholaE11, author = {Elisha O. Ochola and Mariki M. Eloff}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A Review of Black Hole attack on {AODV} Routing in {MANET}}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Ochola\_Eloff.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/OcholaE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/RakitianskaiaOC11, author = {Anastassia S. Rakitianskaia and Martin S. Olivier and Antony K. Cooper}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Nature and Forensic investigation of crime in Second Life}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Rakitianskaia\_Olivier\_Cooper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/RakitianskaiaOC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ReidNS11, author = {Rayne Reid and Johan Van Niekerk and Rossouw von Solms}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Guidelines for the creation of brain compatible cyber security educational material in Moodle 2.0}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/06\_Paper.pdf}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/ReidNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SavolaH11, author = {Reijo Savola and Petri Heinonen}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A Visualization and Modeling Tool for Security Metrics and Measurements Management}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/09\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/SavolaH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SerraV11, author = {Stephen Serra and Hein S. Venter}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Mobile cyber-bullying: {A} proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/99\_paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/SerraV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ShahzadN11, author = {Raja Khurram Shahzad and Niklas Lavesson}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Detecting Scareware by Mining Variable Length Instruction Sequences}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/28\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ShahzadN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SolmsTM11, author = {Rossouw von Solms and Kerry{-}Lynn Thomson and Mvikeli Maninjwa}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Information Security Governance control through comprehensive policy architectures}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/26\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/SolmsTM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/StadenV11, author = {Franscois Van Staden and Hein S. Venter}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Adding digital forensic readiness to electronic communication using a security monitoring tool}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/70\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/StadenV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Stalmans11, author = {Etienne Stalmans}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A Framework for {DNS} based detection and mitigation of malware infections on a network}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/44\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Stalmans11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/StraussO11, author = {Tinus Strauss and Martin S. Olivier}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Network Forensics in a Clean-Slate Internet Architecture}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/94\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/StraussO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/TarwireyiFB11, author = {Paul Tarwireyi and Stephen Flowerday and Anass Bayaga}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Information Security Competence Test with Regards to Password Management}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/29\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/TarwireyiFB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ValjarevicV11, author = {Aleksandar Valjarevic and Hein S. Venter}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Towards a Digital Forensics Readiness Framework for Public Key Infrastructure Systems}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/66\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ValjarevicV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/VeerasamyE11, author = {Namosha Veerasamy and Jan H. P. Eloff}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {{UML} Modelling Of Network Warfare Examples}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Veerasamy.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/VeerasamyE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/WinkelvosRR11, author = {Timo Winkelvos and Carsten Rudolph and J{\"{u}}rgen Repp}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A Property Based Security Risk Analysis Through Weighted Simulation}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/55\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/WinkelvosRR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2011, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, isbn = {978-1-4577-1482-5}, timestamp = {Wed, 08 Feb 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Al-SalloumW10, author = {Ziyad S. Al{-}Salloum and Stephen D. Wolthusen}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Agent-Based Host Enumeration and Vulnerability Scanning Using Dynamic Topology Information}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/13\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Al-SalloumW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/AnuarPFC10, author = {Nor Badrul Anuar and Maria Papadaki and Steven Furnell and Nathan L. Clarke}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {An investigation and survey of response options for Intrusion Response Systems (IRSs)}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/69\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/AnuarPFC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BarskeSJ10, author = {David Barske and Adrie Stander and Jason Jordaan}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A Digital Forensic Readiness Framework for South African SME's}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/30\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BarskeSJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BayagaF10, author = {Anass Bayaga and Stephen Flowerday}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A Conceptual Operational Risk Model for SMEs: Impact on Organisational Information Technology}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/09\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BayagaF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BezuidenhoutMV10, author = {Monique Bezuidenhout and Francois Mouton and Hein S. Venter}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Social Engineering Attack Detection Model: {SEADM}}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/80\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BezuidenhoutMV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ChettyC10, author = {Jacqui Chetty and Marijke Coetzee}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Towards an Information Security Framework for Service-Oriented Architecture}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/35\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ChettyC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/CravenE10, author = {Alain Craven and Mariki M. Eloff}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Biometrics as an Agent to Reduce Fraud in the Micro Lending Industry in South Africa}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/08\_paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/CravenE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/DlaminiVES10, author = {Moses Dlamini and Elmarie Venter and Jan H. P. Eloff and Danie Smit}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Inclusive Information Society - Challenges from a South African Rural Primary Healthcare Perspective}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/24\_paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/DlaminiVES10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/FairuzR10, author = {Mohamed Al Fairuz and Karen Renaud}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Multi-channel, Multi-level Authentication for More Secure eBanking}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/10\_paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/FairuzR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GangadharanP10, author = {Valiya Gangadharan and Laurette Pretorius}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Towards an Ethical Analysis of the {W3C} Web Services Architecture Model}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/81\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GangadharanP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GossB10, author = {Ryan G. Goss and Reinhardt A. Botha}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Deep Packet Inspection - Fear of the Unknown}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/34\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GossB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Grobler10, author = {Marthie Grobler}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Phishing for Fortune}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/01\_paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Grobler10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GroblerB10, author = {Marthie Grobler and Harri Bryk}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Common problems faced during the establishment of a {CSIRT}}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/17\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GroblerB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GroblerL10, author = {Cornelia Grobler and Buks Louwrens}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A Digital Evidence Management Plan}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/53\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GroblerL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GroblerV10, author = {Marthie Grobler and Joey Jansen van Vuuren}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Broadband broadens scope for cyber crime in Africa}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/28\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GroblerV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Kayem10, author = {Anne Kayem}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {On Monitoring Information Flow of Outsourced Data}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/82\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Kayem10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Kyobe10, author = {Michael Kyobe}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Towards a framework to guide compliance with {IS} Security policies and Regulations in a university}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/56\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Kyobe10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/LallaF10, author = {Himal Lalla and Stephen Flowerday}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Towards a Standardised Digital Forensic Process: E-mail Forensics}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/05\_paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/LallaF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/LavarackC10, author = {Tristan Lavarack and Marijke Coetzee}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Considering web services security policy compatibility}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/40\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/LavarackC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MegawF10, author = {Greg Megaw and Stephen Flowerday}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Phishing within E-Commerce: {A} Trust and Confidence Game}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/07\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MegawF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NiekerkM10, author = {Brett van Niekerk and Manoj S. Maharaj}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Mobile Security from an Information Warfare Perspective}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/06\_Paper.pdf}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/NiekerkM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/RamgovindES10, author = {Sumant Ramgovind and Mariki M. Eloff and Elme Smith}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {The Management of Cloud Computing Security}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/27\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/RamgovindES10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/RenaudG10, author = {Karen Renaud and Dora Galvez{-}Cruz}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Privacy: Aspects, Definitions and a Multi-Faceted Privacy Preservation Approach}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/25\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/RenaudG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SavolaPO10, author = {Reijo Savola and Heimo Pentik{\"{a}}inen and Moussa Ouedraogo}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Towards Security Effectiveness Measurement utilizing Risk-Based Security Assurance}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/11\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/SavolaPO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SeegerWBB10, author = {Mark M. Seeger and Stephen D. Wolthusen and Christoph Busch and Harald Baier}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/14\_Paper.pdf}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/SeegerWBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SmithK10, author = {Eugene Smith and Hennie A. Kruger}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A framework for evaluating {IT} security investments in a banking environment}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/04\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/SmithK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SpycherH10, author = {Oliver Spycher and Rolf Haenni}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A Novel Protocol to Allow Revocation of Votes in a Hybrid Voting System}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/44\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/SpycherH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Ssekibuule10, author = {Richard Ssekibuule}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Secure Publish-Subscribe Mediated Virtual Organizations}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/18\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Ssekibuule10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/StadenV10, author = {Francois Ruan Van Staden and Hein S. Venter}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Adding digital forensic readiness to the email trace header}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/45\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/StadenV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/TripathiMR10, author = {Alok Tripathi and Abhinav Mishra and G. V. Raghunathan}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A Test Bed for Information Security Skill Development with Virtual Training Environment}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/03\_paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/TripathiMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Veerasamy10, author = {Namosha Veerasamy}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Motivation for Cyberterrorrism}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/02\_paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Veerasamy10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/VisageO10, author = {Hendrik Visage and Martin S. Olivier}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A Generalized model for understanding and education of Information and Computer Security}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/41\_paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/VisageO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2010, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, isbn = {978-1-4244-5494-5}, timestamp = {Mon, 11 Jun 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/AdimoM09, author = {Anna B. Adimo and Fisseha Mekuria}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Mobile Communications Security Research at {CSIR-MDS}}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {489--490}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/ISSA2009FMekuria.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/AdimoM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BarnettI09, author = {Richard J. Barnett and Barry Irwin}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection Systems}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {269--278}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/26\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BarnettI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BoshoffN09, author = {Ryno Boshoff and Johan Van Niekerk}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {E-mail Security awareness at Nelson Mandela Metropolitan University (Registrar's Division)}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {279--292}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/23\_Paper.pdf}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/BoshoffN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ChettyC09, author = {Jacqui Chetty and Marijke Coetzee}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Evaluating Information Security Controls Applied by Service-Oriented Architecture Governance Frameworks}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {227--242}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/7\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ChettyC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/CowieIB09, author = {Bradley Cowie and Barry Irwin and Richard J. Barnett}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Management, Processing and Analysis of Cryptographic Network Protocols}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {479--488}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/20.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/CowieIB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/DagadaEV09, author = {Rabelani Dagada and Mariki M. Eloff and Lucas M. Venter}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Too Many Laws But Very Little Progress! Is South African Highly Acclaimed Information Security Legislation Redundant?}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {327--346}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/4\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/DagadaEV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/DlaminiEEH09, author = {Moses Dlamini and Mariki M. Eloff and Jan H. P. Eloff and Karin H{\"{o}}ne}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {{BC3I} - Towards Requirements Specification for Preparing an Information Security Budget}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {53--68}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/57\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/DlaminiEEH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/DlaminiO09, author = {Innocentia Dlamini and Martin S. Olivier}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {The Design of a Logical Traffic Isolation Forensic Model}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {407--418}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/53\_ISSA-IZ\_Dlamini.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/DlaminiO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/FrauensteinS09, author = {Edwin Donald Frauenstein and Rossouw von Solms}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Phishing: How an Organization can Protect Itself}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {253--268}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/12\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/FrauensteinS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GodlstuckD09, author = {Arthur Godlstuck and Rabelani Dagada}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Help Us! We Want to be "E-Secured": Digital Banking Customers' Security Needs in South Africa}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {117--136}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/55\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GodlstuckD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GroblerL09, author = {Cornelia Grobler and Buks Louwrens}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {High-Level Integrated Vie of Digital Forensics}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {15--34}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/28\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GroblerL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GroblerS09, author = {Marthie Grobler and Basie von Solms}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {A Best Practice Approach to Live Forensic Acquisition}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {3--13}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/1\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GroblerS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HjelmasSW09, author = {Erik Hjelm{\aa}s and Nils Kalstad Svendsen and Stephen D. Wolthusen}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Integrating Information Security with Information System Architecture and Administration Curricula}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {363--376}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/13\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/HjelmasSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KarokolaY09, author = {Geoffrey Karokola and Louise Yngstr{\"{o}}m}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Discussing E-Government Maturity Models for the Developing World - Security View}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {81--98}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/30\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KarokolaY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/LatzeRU09, author = {Carolin Latze and Andreas Ruppen and Ulrich Ultes{-}Nitsche}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {A Proof of Concept Implementation of a Secure E-Commerce Authentication Scheme}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {379--392}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/15\_latze-ruppen-ultes-nitsche.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/LatzeRU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/LavarackC09, author = {Tristan Lavarack and Marijke Coetzee}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {A Framework for Web Services Security Policy Negotiation}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {153--170}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/36\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/LavarackC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Meer09, author = {Haroon Meer}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {An examination of the Generic Exploit Prevention Mechanisms on Apple's Leopard Operating System}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {137--152}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/38\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Meer09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MonkNS09, author = {Thomas Monk and Johan Van Niekerk and Rossouw von Solms}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Concealing the Medicine: Information Security Education through Game Play}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {467--478}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/10.pdf}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MonkNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MwakalingaKY09, author = {Jeffy Mwakalinga and Stewart Kowalski and Louise Yngstr{\"{o}}m}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Methodology for Considering Environments and Culture in Developing Information Security Systems}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {419--436}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/9\_SecEnvFinal.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MwakalingaKY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NgobeniG09, author = {Sipho Josia Ngobeni and Marthie Grobler}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Information Security Policies for Governmental Organisations, The Minimum Criteria}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {455--466}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/50.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/NgobeniG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NgobeniV09, author = {Sipho Josia Ngobeni and Hein S. Venter}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {The Design of a Wireless Forensic Readiness Model(WFRM)}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {35--52}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/52\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/NgobeniV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NjengaB09, author = {Kennedy Njenga and Irwin Brown}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Inductively Deriving an Organisational Information Security Risk Management Agenda by Exploring Process Improvisation}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {347--362}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/39\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/NjengaB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NottinghamI09, author = {Alastair Nottingham and Barry Irwin}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Investigating the effect of Genetic Algorithms on Filter Optimisation Within Fast Packet Classifiers}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {99--116}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/21\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/NottinghamI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/PranschkeIB09, author = {George{-}Christian Pranschke and Barry Irwin and Richard J. Barnett}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Automated Firewall Rule Set Generation Through Passive Traffic Inspection}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {243--252}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/19\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/PranschkeIB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Savola09, author = {Reijo Savola}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Identification of Basic Measurable Security Components in Software-Intensive Systems}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {69--80}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/34\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Savola09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SchaeferWHP09, author = {Christian Schaefer and Thomas Walter and Mat{\'{u}}s Harvan and Alexander Pretschner}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Usage Control Policy Enforcement in OpenOffice.org and Information Flow}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {393--406}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/9\_UsageControlPolicyEnforcement.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/SchaeferWHP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SmithC09, author = {Gregory Stuart Smith and Marijke Coetzee}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {An Analysis of Authentication for Passive {RFID} Tags}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {189--204}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/14\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/SmithC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/StadenV09, author = {Franscois Van Staden and Hein S. Venter}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {The State of the Art of Spam and Anti-Spam Strategies and a Possible Solution using Digital Forensics}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {437--454}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/47.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/StadenV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/StanderDR09, author = {Adrie Stander and A. Dunnet and J. Rizzo}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {A Survey of Computer Crime and Security in South Africa}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {217--226}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/56\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/StanderDR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/VeerasamyT09, author = {Namosha Veerasamy and Barend Taute}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {An Introduction to Emerging Threats and Vulnerabilities to Create User Awareness}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {205--216}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/24\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/VeerasamyT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/VictorRB09, author = {Rudi Victor and Andrew Rutherford and Reinhardt A. Botha}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Enhanced Presence Handling}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {309--326}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/29\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/VictorRB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/VuralV09, author = {Ickin Vural and Hein S. Venter}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Investigating Identity Concealing and Email Tracing Techniques}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {293--308}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/40\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/VuralV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ZielinskiO09, author = {Marek P. Zielinski and Martin S. Olivier}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {How Appropriate is K-Anonymity for Addressing the Conflict Between Privacy and Information Utility in Microdata ASnonymisation}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {171--188}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/46\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ZielinskiO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2009, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, isbn = {978-1-86854-740-1}, timestamp = {Wed, 08 Feb 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Amsenga08, author = {Johann Amsenga}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {An Introduction to Standards related to Information Security}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--18}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/24.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Amsenga08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BiermannM08, author = {Elmarie Biermann and Jan Mentz}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {Emerging Framework for The Evaluation of Open Source Security Tools}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--15}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/69.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BiermannM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Dayarathna08, author = {Rasika Dayarathna}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {The Principle of Security Safeguards: Accidental Activities}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--18}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/63.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Dayarathna08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/DeasF08, author = {Matthew Deas and Stephen Flowerday}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {A User Centric Model for Online Identity and Access Management}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--21}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/13.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/DeasF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/EhretU08, author = {Christoph Ehret and Ulrich Ultes{-}Nitsche}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {Immune System Based Intrusion Detection System}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/50.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/EhretU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/FrangopoulosEV08, author = {Evangelos D. Frangopoulos and Mariki M. Eloff and Lucas M. Venter}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {Social Aspects of Information Security}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--33}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/16.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/FrangopoulosEV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/IrwinF08, author = {Barry Irwin and Blake Friedman}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {Spam Construction Trends}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/49.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/IrwinF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KarokolaY08, author = {Geoffrey Karokola and Louise Yngstr{\"{o}}m}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {Lessons Learnt in the Process of Computerization, Automation and Management of {ICT} Security in the Developing World: {A} Case Study of The University of Dar Es Salaam, Tanzania}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--24}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/68.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KarokolaY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KhayariKS08, author = {Rachid El Khayari and Nicolai Kuntze and Andreas U. Schmidt}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {Spam Over Internet Telephony and How to Deal with it}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--25}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/67.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KhayariKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KoenO08, author = {Renico Koen and Martin S. Olivier}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {The Use of File Timestamps in Digital Forensics}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--16}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/43.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KoenO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KohnEO08, author = {Michael K{\"{o}}hn and Jan H. P. Eloff and Martin S. Olivier}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {{UML} Modelling of Digital Forensic Process Models (DFPMs)}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--13}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/25.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KohnEO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KrugerSDM08, author = {Hennie A. Kruger and Tjaart Steyn and Lynette Drevin and Dawn Medlin}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {Password Management: Empirical Results from a {RSA} and {USA} Study}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/32.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KrugerSDM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/LatzeU08, author = {Carolin Latze and Ulrich Ultes{-}Nitsche}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {A Proof-of-Concept Implementation of {EAP-TLS} with {TPM} Support}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/46.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/LatzeU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/LessingW08, author = {Marthie Lessing and Lara Weissenberger}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {No Age Discrimination for Biometrics}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--26}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/1.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/LessingW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Mahanamahewa08, author = {Sri Warna Mahanamahewa}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {Computer Monitoring in the 21st Century Workplace}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--15}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/15.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Mahanamahewa08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MokhonoanaO08, author = {Pontjho Mokhonoana and Martin S. Olivier}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {Application of Message Digests for the Verification of Logical Forensic Data}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/42.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MokhonoanaO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NiekerkS08, author = {Johan Van Niekerk and Rossouw von Solms}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {Bloom's Taxonomy for Information Security Education}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--13}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/39.pdf}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/NiekerkS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NjengaB08, author = {Kennedy Njenga and Irwin Brown}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {Collective Improvisation: Complementing Information Security Frameworks with Self-Policing}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--16}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/38.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/NjengaB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Pistorius08, author = {Tana Pistorius}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {The {IP} Protection of Electronic Databases: Copyright or Copywrong?}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--18}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/66.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Pistorius08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Savola08, author = {Reijo Savola}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {A Novel Security Metrics Taxonomy for R{\&}D Organisations}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/2.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Savola08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ShandT08, author = {Leonard Shand and Theodore Tryfonas}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--18}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/45.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ShandT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/StephanouD08, author = {Tony Stephanou and Rabelani Dagada}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further Research}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--21}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/54.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/StephanouD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/TvrzC08, author = {Frankie Tvrz and Marijke Coetzee}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {The Information Security of a Bluetooth-Enabled Handheld Device}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/3.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/TvrzC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/VeerasamyE08, author = {Namosha Veerasamy and Jan H. P. Eloff}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {Towards a Framework for a Network Warfare Capability}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--18}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/9.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/VeerasamyE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2008, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, isbn = {978-1-86854-693-0}, timestamp = {Tue, 17 Feb 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ArnabH06, author = {Alapan Arnab and Andrew Hutchison}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Ticket Based Identity System for {DRM}}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/19\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ArnabH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BakariMTY06, author = {Jabiri Kuwe Bakari and Christer Magnusson and Charles N. Tarimo and Louise Yngstr{\"{o}}m}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Outsourcing {ICT} Security to {MSSP:} Issues and Challenges for The Developing World}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/29\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BakariMTY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BranaganDL06, author = {Mark Branagan and Robert Dawson and Dennis Longley}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Security Risk Analysis for Complex Systems}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/35\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BranaganDL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BrandiO06, author = {Wesley Brandi and Martin S. Olivier}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {On bidder zones, cell phones and ballot stuffing}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/83\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BrandiO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BraunGUBB06, author = {Torsten Braun and Christoph Graf and Ulrich Ultes{-}Nitsche and Aurelius Baier and Thomas Bernoulli}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Case Study of the Usage of an Authentication and Authorization Infrastructure {(AAI)} in an E-Learning Project}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/27\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BraunGUBB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ClaytonIT06, author = {Bradley Clayton and Barry Irwin and Alfredo Terzoli}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Integrating Secure {RTP} into the Open Source VoIP {PBX} Asterisk}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/66\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ClaytonIT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/CroftO06, author = {Neil J. Croft and Martin S. Olivier}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Sequenced Release of Privacy Accurate Call Data Record Information in a {GSM} Forensic Investigation}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--14}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/96\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/CroftO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Etsebeth06, author = {Verine Etsebeth}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Information Security Policies - The Legal Risk of Uninformed Personnel}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/104\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Etsebeth06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Innerhofer-OberperflerB06, author = {Frank Innerhofer{-}Oberperfler and Ruth Breu}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Using an Enterprise Architecture for {IT} Risk Management}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/115\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Innerhofer-OberperflerB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KohnOE06, author = {Michael K{\"{o}}hn and Martin S. Olivier and Jan H. P. Eloff}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Framework for a Digital Forensic Investigation}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--7}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/101\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KohnOE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KrugerDS06, author = {Hennie A. Kruger and Lynette Drevin and Tjaart Steyn}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A Framework for Evaluating {ICT} Security Awareness}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/17\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KrugerDS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KuntzeS06, author = {Nicolai Kuntze and Andreas U. Schmidt}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Trusted Computing in Mobile Action}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/9\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KuntzeS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/LoutsiosP06, author = {Demetrios Loutsios and Maree Pather}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A Brokered Approach to Interoperable Security in OGSA-Based Grid Systems}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/119\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/LoutsiosP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MaphakelaP06, author = {Rabbie Maphakela and Dalenca Pottas}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Towards Regulatory Compliance - {A} model for the South African Financial Sector}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/73\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MaphakelaP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/McManusE06, author = {Leonie McManus and Jan H. P. Eloff}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Using {IT} Benchmarking Principles to Design an Information Security Benchmark Model}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/100\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/McManusE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Merwe06, author = {Thomas McDonald van der Merwe}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A Profile of The Distance Computing Student Softlifter}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--20}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/74\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Merwe06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MwakalingaY06, author = {Jeffy Mwakalinga and Louise Yngstr{\"{o}}m}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Framework for Securing Mobile Software Agents}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/107\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MwakalingaY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NiekerkL06, author = {Liesl van Niekerk and Les Labuschagne}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {The Peculium Model: Information Security Risk Management for the South African {SMME}}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--14}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/12\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/NiekerkL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NiekerkS06, author = {Johan Van Niekerk and Rossouw von Solms}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Understanding Information Security Culture: {A} Conceptual Framework}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/21\_Paper.pdf}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/NiekerkS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NjengaB06, author = {Kennedy Nduati Njenga and Irwin Brown}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Conceptualising the Influence of Tacit Knowledge in Security Risk Management Activities}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/92\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/NjengaB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OphoffPB06, author = {Jacobus A. Ophoff and Stephen Perelson and Reinhardt A. Botha}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A Model for Secure Value-Added Service Subscriptions in Cellular Networks}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--9}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/60\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/OphoffPB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OrmistonE06, author = {Kate Ormiston and Mariki M. Eloff}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Denial-of-Service {\&} Distributed Denial-of-Service on The Internet}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--14}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/18\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/OrmistonE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OttenIS06, author = {Fred Otten and Barry Irwin and Hannah Slay}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {The Need for Centralised, Cross Platform Information Aggregation}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/63\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/OttenIS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/PreezP06, author = {Dirk Willie du Preez and Vreda Pieterse}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Calculating Compliance Standards}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/32\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/PreezP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/RasheedEKKF06, author = {Abdullah Haroon Rasheed and Muhammad Essam and Umair Khalid and Shoab Ahmed Khan and Sheikh Muhammad Farhan}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A Low Bit Architecture for a Very Compact Hardware Implementation of the {AES} Algorithm}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--8}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/68\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/RasheedEKKF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/RielI06, author = {Jean{-}Pierre van Riel and Barry Irwin}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Identifying and Investigating Intrusive Scanning Patterns by Visualizing Network Telescope Traffic in a 3-D Scatter-plot}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/50\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/RielI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Savola06, author = {Reijo Savola}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Towards Security Evaluation based on Evidence Collection}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/10\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Savola06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SchmidtP06, author = {Andreas U. Schmidt and Jan Piechalski}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Authorised Translations of Electronic Documents}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--14}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/3\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/SchmidtP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/TarimoBYK06, author = {Charles N. Tarimo and Jabiri Kuwe Bakari and Louise Yngstr{\"{o}}m and Stewart Kowalski}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A Social-Technical View of {ICT} Security Issues, Trends, and Challenges: Towards a Culture of {ICT} Security - The Case of Tanzania}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/25\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/TarimoBYK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/TyukalaPSH06, author = {Mkhululi Tyukala and Dalenca Pottas and Rossouw von Solms and Helen van de Haar}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {The Organisational Information Security Profile - {A} Tool to Assist The Board}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--13}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/79\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/TyukalaPSH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Watney06, author = {Murdoch Watney}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Justifiability of State Surveillance of the Internet as E-Security Mechanism}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/117\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Watney06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/WhiteI06, author = {Dominic White and Barry Irwin}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Monthly Patch Release Schedules: Do the Benefits Outweigh the Risks?}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--18}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/61\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/WhiteI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ZugenmaierPL06, author = {Alf Zugenmaier and Anand R. Prasad and Julien Laganier}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Performance Analysis of a Secure Seamless Handover Mechanism in All-IP Networks}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/65\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ZugenmaierPL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2006, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, isbn = {1-86854-636-5}, timestamp = {Tue, 17 Feb 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ArnabH05, author = {Alapan Arnab and Andrew Hutchison}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Requirement Analysis of Enterprise {DRM} Systems}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--14}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/024\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ArnabH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Baloyi05, author = {Norman Tinyiko Baloyi}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Analysis of the financial institutions' strategic e-business security solutions: Technical and non-Technical}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/080\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Baloyi05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Blaauw05, author = {Pieter Blaauw}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Fighting spam in a corporate environment using open-source solutions - a case study}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/005\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Blaauw05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BornmanL05, author = {Werner Bornman and Les Labuschagne}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A Framework for Information Security Risk Management Communication}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/017\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BornmanL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Breytenbach05, author = {Christoff Breytenbach}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Introduction to Assessing and Securing Web Services}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--14}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/058\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Breytenbach05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ChaulaYK05, author = {Job Asheri Chaula and Louise Yngstr{\"{o}}m and Stewart Kowalski}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A Framework for Evaluation of Information Systems Security}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/062\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ChaulaYK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/CloranI05, author = {Russell Cloran and Barry Irwin}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Trust on the Web}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--9}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/025\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/CloranI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/CoetzeeE05, author = {Marijke Coetzee and Jan H. P. Eloff}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Metadata for trust in service-oriented architectures}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/032\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/CoetzeeE05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/CruzL05, author = {Eduardo Da Cruz and Les Labuschagne}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A new framework for bridging the gap between {IT} Service Management and {IT} Governance from a security perspective}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/072\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/CruzL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/FrangopoulosVE05, author = {Evangelos D. Frangopoulos and Lucas M. Venter and Mariki M. Eloff}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Secure Authentication combined with Anonymity: The end of an oxymoron?}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/060\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/FrangopoulosVE05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Ghioni05, author = {Fabio Ghioni}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Invasion of the RFIDs: are we heading towards "Modern Times"?}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--5}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/074\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Ghioni05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Hershensohn05, author = {Johann Hershensohn}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {{IT} Forensics: the collection of and presentation of digital evidence}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--14}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/076\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Hershensohn05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Irwin05, author = {Barry Irwin}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Unlocking the armour : enabling intrusion detection and analysis of encrypted traffic streams}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, timestamp = {Wed, 18 Feb 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Irwin05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/IzadiniaEK05, author = {Vafa D. Izadinia and Jan H. P. Eloff and Derrick G. Kourie}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Foiling an Attack - Defeating IPSec Tunnel Fingerprinting}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--14}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/088\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/IzadiniaEK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Jansen05, author = {M. Jansen}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Access to copyrighted work: right or privelege?}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/002\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Jansen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KrugerK05, author = {Hennie A. Kruger and Wayne D. Kearney}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Measuring Information Security Awareness - {A} West Africa Gold Mining Environment Case}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/018\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KrugerK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ListB05, author = {William List and David Brewer}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Measuring the effectivness of an internal control system}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--13}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/101\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ListB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/LongleyB05, author = {Dennis Longley and Mark Branagan}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Developing Threat Networks for Risk Analysis of Information Systems}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/022\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/LongleyB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/LoockE05, author = {Marianne Loock and Jan H. P. Eloff}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A new Access Control model based on the Chinese Wall Security Policy Model}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Research/096\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/LoockE05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MarnewickL05, author = {Carl Marnewick and Les Labuschagne}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A security framework for an {ERP} system}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--15}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/009\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MarnewickL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MlangeniB05, author = {S. A. Mlangeni and E. Biermann}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {An assessment of Information Security Policies within the Polokwane area: {A} case study}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--9}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/008\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MlangeniB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MorkelEO05, author = {Tayana Morkel and Jan H. P. Eloff and Martin S. Olivier}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {An overview of image steganography}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/098\_Article.pdf}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MorkelEO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MulderS05, author = {R. Mulder and Rossouw von Solms}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {The Proliferation of Wireless Devices and its Role in Corporate Governance}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/048\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MulderS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MwakalingaY05, author = {Jeffy Mwakalinga and Louise Yngstr{\"{o}}m}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Sketch of a generic security framework based on the paradigms of systemic-holistic approach and the immune system}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/037\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MwakalingaY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NiekerkS05, author = {Johan Van Niekerk and Rossouw von Solms}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A holistic framework for the fostering of an information security sub-culture in organizations}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--13}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/041\_Article.pdf}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/NiekerkS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OkamuraYF05, author = {Shingo Okamura and Maki Yoshida and Toru Fujiwara}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/047\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/OkamuraYF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OphoffB05, author = {Jacobus A. Ophoff and Reinhardt A. Botha}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Revisiting Reachability Management as a Multilateral Security Mechanism}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/011\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/OphoffB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Parkin05, author = {Emile Parkin}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Cryptographic Key Management principles applied in South African Internet Banking}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/059\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Parkin05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/PatherV05, author = {Maree Pather and L. M. Venter}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Securing {SOAP} Messages with a Global Message Handler and a Standardized Envelope}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--13}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/065\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/PatherV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SchliengerTR05, author = {Thomas Schlienger and Stephanie Teufel and Raphael Rues}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Information Security Culture - Status Quo in Switzerland}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, timestamp = {Fri, 09 Nov 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/SchliengerTR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SchmidtKR05, author = {Andreas U. Schmidt and Nicolai Kuntze and Thomas Rauch}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Security for Distributed Web-Services via Aspect-Oriented Programming}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/003\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/SchmidtKR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SlavieroKO05, author = {Marco Slaviero and Jaco Kroon and Martin S. Olivier}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Attacking Signed Binaries}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/099\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/SlavieroKO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/TarimoYK05, author = {Charles N. Tarimo and Louise Yngstr{\"{o}}m and Stewart Kowalski}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {An approach to enhance the security of {ICT} infrastructure through legal, regulatory influences}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/043\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/TarimoYK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/TuyikezeP05, author = {Tite Tuyikeze and Dalenca Pottas}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Information Security Management and Regulatory Compliance in the South African Health Sector}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/038\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/TuyikezeP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2005, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, isbn = {1-86854-625-X}, timestamp = {Wed, 18 Feb 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Andersson04, author = {Christer Andersson}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Privacy Enhanced Wap Browsing With Mcrowds Anonymity Properties And Performance Evaluation Of The Mcrowds System}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/046.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Andersson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Arthur04, author = {K. K. Arthur}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {An Investigation Into Computer Forensic Tools}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/060.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Arthur04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Bornman04, author = {W. G. Bornman}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A Framework For Aligning Information Security Risk Management Methods With It Governance Recommendations}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--14}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/015.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Bornman04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Botha04, author = {Martin Botha}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Utilizing Neural Networks For Effective Intrusion Detection}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--15}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/040.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Botha04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Brandi04, author = {Wesley Brandi}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {On Privacy And The Web}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--8}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/079.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Brandi04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Breedt04, author = {Morn{\'{e}} Breedt}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Using {A} Central Data Repository For Biometric Authentication In Passport Systems}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/072.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Breedt04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Casmir04, author = {Respickius Casmir}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Intrinsic Legal Issues In It Security}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/001.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Casmir04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Coetzee04, author = {Marijke Coetzee}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A Logic-Based Access Control Approach For Web Services}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/020.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Coetzee04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Eeden04, author = {Johannes J. van Eeden}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Security Considerations In {A} Global Message Service Handler Design}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/044.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Eeden04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Farhan04, author = {Sheikh Muhammad Farhan}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {High Data Rate 8-Bit Crypto Processor}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/008.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Farhan04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Forte04, author = {Dario Forte}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {The "Art" Of Log Correlation - Tools And Techniques For Correlating Events And Log Files}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--15}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/006.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Forte04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Frangopoulos04, author = {Evangelos D. Frangopoulos}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A Comparative Study Of Standards And Practices Related To Information Security Management}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--15}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/033.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Frangopoulos04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Frangopoulos04a, author = {Evangelos D. Frangopoulos}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Biometric Protection Of Smartcards Through Fingerprint Matching: {A} Technological Overview And Possible Directions}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--13}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/011.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Frangopoulos04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Ghioni04, author = {Fabio Ghioni}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Advanced Platform For Corporate Incident Detection And Management}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/014.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Ghioni04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Granova04, author = {Anna Granova}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {South African Online Banking: Who Carries The Risk?}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/081.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Granova04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Grogler04, author = {Telanie Grogler}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Assessing The Policy Dimension Of Information Security}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--18}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/051.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Grogler04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Hertenberger04, author = {Manfred P. Hertenberger}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A Case For Information Ownership In Erp Systems}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/009.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Hertenberger04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Joe04, author = {Say Joe}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Case Studies Of Japan, South Korea And China In Implementation Of IPv6}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/027.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Joe04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Jones04, author = {Mariette Jones}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Legality Of Monitoring E-Mail At The Workplace: {A} Legal Update}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/078.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Jones04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Li04, author = {Yun (Lillian) Li}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Categorizing Vulnerabilities Using Data Clustering Techniques}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/063.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Li04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Mwakalinga04, author = {Jeffy Mwakalinga}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Integrated Security System Based On Security Assertion Markup Language Standard}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--9}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/070.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Mwakalinga04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Nackros04, author = {Kjell N{\"{a}}ckros}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Applied Holistic Approach For Security Awareness And Training - Computer Games As Means To Increase Users' Information And Communication Security Awareness}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/047.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Nackros04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Niekerk04, author = {Johan Van Niekerk}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Organisational Learning Models For Information Security Education}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/043.pdf}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Niekerk04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Nkundlaa04, author = {S. Nkundlaa}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {The Protection Of Public Health Data - {A} Case Study}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/036.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Nkundlaa04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Pather04, author = {Maree Pather}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Are Current B2b Security Standards Antithetical To Global Interoperability?}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/028.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Pather04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Perelson04, author = {Stephen Perelson}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {An Investigation Into Access Control For Mobile Devices}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/035.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Perelson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Phyo04, author = {Aung Htike Phyo}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A Framework For Monitoring Insider Misuse Of It Applications}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/021.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Phyo04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Ramdeyal04, author = {Arvish Ramdeyal}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A General Methodology For The Development Of An Effective Information Security Policy}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/074.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Ramdeyal04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Rutherford04, author = {Andrew Rutherford}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Towards Hippocratic Log Files}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/019.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Rutherford04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Staden04, author = {Wynand van Staden}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A Virtual Machine For Security In {A} Relational Database Management System: Design Issues}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--13}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/056.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Staden04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Thomas04, author = {Anitta Thomas}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Propagating Trust In The Web Services Framework}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/012.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Thomas04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Ultes-Nitsche04, author = {Ulrich Ultes{-}Nitsche}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Run-Time Protocol Conformance Verification In Firewalls}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/080.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Ultes-Nitsche04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/White04, author = {Dominic White}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A Unified Architecture For Automatic Software Updates}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/024.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/White04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Zielinski04, author = {Marek Zielinski}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/016.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Zielinski04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2004, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, isbn = {1-86854-522-9}, timestamp = {Wed, 18 Feb 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2002, title = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, publisher = {ISSA, Pretoria, South Africa}, year = {2003}, timestamp = {Wed, 18 Feb 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Botha02, author = {Jacques Botha}, title = {A cyclic approach to Business Continuity Planning}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A006.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Botha02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Brandi02, author = {Wesley Brandi}, title = {On the Semantic Web and its Web of Trust}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A031.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Brandi02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ChudleyU02, author = {Simon R. Chudley and Ulrich Ultes{-}Nitsche}, title = {Configuring Firewalls - An XML-based Approach to Modelling and Implementing Firewall Configurations}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A012.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ChudleyU02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Coetzee02, author = {Marijke Coetzee}, title = {Secure Database Connectivity On The {WWW}}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A029.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Coetzee02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Dembskey02, author = {Evan James Dembskey}, title = {Quantum Cryptography - Advances in computer science may radically alter cryptography}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A017.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Dembskey02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Engelbrecht02, author = {Willem Engelbrecht}, title = {Access control and separation of duty in agent-based workflow environments}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A020.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Engelbrecht02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Gerber02, author = {Petrunel Gerber}, title = {Information Security Health Check}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A009.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Gerber02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Holz02, author = {Thomas Holz}, title = {An Efficient Intrusion Detection System Design}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A014.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Holz02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Hone02, author = {Karin H{\"{o}}ne}, title = {Information Security Policy - What do International Information Security Standards say?}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A027.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Hone02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Hoppe02, author = {Oliver Andre Hoppe}, title = {Security architecture of the Microsoft .NET framework}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A028.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Hoppe02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Ingram02, author = {Lance A. K. Ingram}, title = {Towards a pattern-based approach for achieving semantic integrity in object-relational databases}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--9}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A019.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Ingram02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Kotze02, author = {Paula Kotz{\'{e}}}, title = {Feedback And Task Analysis For E-Commerce Sites}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--17}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A038.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Kotze02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Loock02, author = {Marianne Loock}, title = {Minimizing Security Risk Areas revealed by Data mining}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--15}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A030.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Loock02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Martins02, author = {Ad{\'{e}}le Martins}, title = {Assessing Information Security Culture}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--14}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A026.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Martins02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Munro02, author = {Kim Munro}, title = {Steganography - is it becoming a double-edged sword in computer security?}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--17}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A013.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Munro02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Niekerk02, author = {Johan Van Niekerk}, title = {A Web-Based Portal For Information Security Education}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A034.pdf}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Niekerk02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Plessis02, author = {Lindie du Plessis}, title = {Information Security Awareness: Baseline Education and Certification}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A008.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Plessis02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Robbertze02, author = {Lizette Robbertze}, title = {Information Security Implementation Methodologies}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--19}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A032.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Robbertze02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/RollasonAM02, author = {John Rollason and Tom Addison and Kim Munro}, title = {{IS} Security: User Identification and Authentication - The First Pillar of {IS} Security}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--15}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A022.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/RollasonAM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Searle02, author = {Francois Searle}, title = {An Analysis of Anonymity on the Internet}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--13}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A005.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Searle02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Taylor02, author = {Simon Taylor}, title = {Practical Unix Security - Securing IBM's {AIX}}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--13}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A001.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Taylor02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Thomson02, author = {Kerry{-}Lynn Thomson}, title = {Corporate Governance: Information security the weakest link?}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A007.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Thomson02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Ultes-NitscheY02, author = {Ulrich Ultes{-}Nitsche and InSeon Yoo}, title = {An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A011.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Ultes-NitscheY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Venter02, author = {Hein S. Venter}, title = {Comparing Intrusion Detection Tools using Generic Vulnerability Categories}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--18}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A025.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Venter02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Venter02a, author = {Karin Venter}, title = {The Delegation Authorization Model: {A} Model For The Dynamic Delegation Of Authorization Rights In {A} Secure Workflow Management System}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--13}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A021.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Venter02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Villiers02, author = {Peter Jonathan de Villiers}, title = {Towards a Content-based Billing Model: The Synergy between Access Control and Billing}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--10}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A018.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Villiers02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Vroom02, author = {Cheryl Vroom}, title = {Auditing the Employee in the Work Environment with Regard to Information Security}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, pages = {1--11}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A010.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Vroom02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Zuccato02, author = {Albin Zuccato}, title = {A modified mean value approach to assess security risk}, booktitle = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa}, publisher = {ISSA, Pretoria, South Africa}, year = {2002}, url = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A024.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Zuccato02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.