Search dblp for Publications

export results for "stream:conf/issa:"

 download as .bib file

@proceedings{DBLP:conf/issa/2019,
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Information and Cyber Security - 18th International Conference, {ISSA}
                  2019, Johannesburg, South Africa, August 15, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1166},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-43276-8},
  doi          = {10.1007/978-3-030-43276-8},
  isbn         = {978-3-030-43275-1},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/AyongN19,
  author       = {Kenneth Ayong and
                  Rennie Naidoo},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {An Institutional Trust Perspective of Cloud Adoption Among SMEs in
                  South Africa},
  booktitle    = {Information and Cyber Security - 18th International Conference, {ISSA}
                  2019, Johannesburg, South Africa, August 15, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1166},
  pages        = {145--157},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43276-8\_11},
  doi          = {10.1007/978-3-030-43276-8\_11},
  timestamp    = {Thu, 19 Mar 2020 14:43:24 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/AyongN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BahAAK19,
  author       = {Abdramane Bah and
                  Pascal Andr{\'{e}} and
                  J. Christian Attiogb{\'{e}} and
                  Jacqueline Konat{\'{e}}},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Federation of Services from Autonomous Domains with Heterogeneous
                  Access Control Models},
  booktitle    = {Information and Cyber Security - 18th International Conference, {ISSA}
                  2019, Johannesburg, South Africa, August 15, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1166},
  pages        = {83--98},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43276-8\_7},
  doi          = {10.1007/978-3-030-43276-8\_7},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BahAAK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BaloyiK19,
  author       = {Ntsako Baloyi and
                  Paula Kotz{\'{e}}},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Data Privacy Compliance Benefits for Organisations - {A} Cyber-Physical
                  Systems and Internet of Things Study},
  booktitle    = {Information and Cyber Security - 18th International Conference, {ISSA}
                  2019, Johannesburg, South Africa, August 15, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1166},
  pages        = {158--172},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43276-8\_12},
  doi          = {10.1007/978-3-030-43276-8\_12},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BaloyiK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BoltonGK19,
  author       = {Anthony Bolton and
                  Leila Goosen and
                  Elmarie Kritzinger},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Security Aspects of an Empirical Study into the Impact of Digital
                  Transformation via Unified Communication and Collaboration Technologies
                  on the Productivity and Innovation of a Global Automotive Enterprise},
  booktitle    = {Information and Cyber Security - 18th International Conference, {ISSA}
                  2019, Johannesburg, South Africa, August 15, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1166},
  pages        = {99--113},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43276-8\_8},
  doi          = {10.1007/978-3-030-43276-8\_8},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/BoltonGK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GovenderKL19,
  author       = {Sunthoshan G. Govender and
                  Elmarie Kritzinger and
                  Marianne Loock},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Information Security Cost Reduction Through Social Means},
  booktitle    = {Information and Cyber Security - 18th International Conference, {ISSA}
                  2019, Johannesburg, South Africa, August 15, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1166},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43276-8\_1},
  doi          = {10.1007/978-3-030-43276-8\_1},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GovenderKL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GovenderW19,
  author       = {Indren Govender and
                  Bruce Watson},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Theorising Information Security Policy Violations},
  booktitle    = {Information and Cyber Security - 18th International Conference, {ISSA}
                  2019, Johannesburg, South Africa, August 15, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1166},
  pages        = {131--144},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43276-8\_10},
  doi          = {10.1007/978-3-030-43276-8\_10},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GovenderW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HutchinsonO19,
  author       = {Gershon Hutchinson and
                  Jacques Ophoff},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {A Descriptive Review and Classification of Organizational Information
                  Security Awareness Research},
  booktitle    = {Information and Cyber Security - 18th International Conference, {ISSA}
                  2019, Johannesburg, South Africa, August 15, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1166},
  pages        = {114--130},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43276-8\_9},
  doi          = {10.1007/978-3-030-43276-8\_9},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/HutchinsonO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/LekotaC19,
  author       = {Faith Lekota and
                  Marijke Coetzee},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {An Aviation Sector {CSIRT} for Sub-Saharan Africa},
  booktitle    = {Information and Cyber Security - 18th International Conference, {ISSA}
                  2019, Johannesburg, South Africa, August 15, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1166},
  pages        = {28--42},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43276-8\_3},
  doi          = {10.1007/978-3-030-43276-8\_3},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/LekotaC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MoganediP19,
  author       = {Sophia Moganedi and
                  Dalenca Pottas},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Threats and Vulnerabilities Affecting Fitness Wearables: Security
                  and Privacy Theoretical Analysis},
  booktitle    = {Information and Cyber Security - 18th International Conference, {ISSA}
                  2019, Johannesburg, South Africa, August 15, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1166},
  pages        = {57--68},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43276-8\_5},
  doi          = {10.1007/978-3-030-43276-8\_5},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MoganediP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SnymanK19,
  author       = {Dirk Snyman and
                  Hennie A. Kruger},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {A Management Decision Support System for Evaluating Information Security
                  Behaviour},
  booktitle    = {Information and Cyber Security - 18th International Conference, {ISSA}
                  2019, Johannesburg, South Africa, August 15, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1166},
  pages        = {15--27},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43276-8\_2},
  doi          = {10.1007/978-3-030-43276-8\_2},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SnymanK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Toit19,
  author       = {Jaco du Toit},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {{PAUDIT:} {A} Distributed Data Architecture for Fitness Data},
  booktitle    = {Information and Cyber Security - 18th International Conference, {ISSA}
                  2019, Johannesburg, South Africa, August 15, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1166},
  pages        = {43--56},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43276-8\_4},
  doi          = {10.1007/978-3-030-43276-8\_4},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Toit19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ZazazaVS19,
  author       = {Lelethu Zazaza and
                  H. S. Venter and
                  George Sibiya},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {A Conceptual Model for Consent Management in South African e-Health
                  Systems for Privacy Preservation},
  booktitle    = {Information and Cyber Security - 18th International Conference, {ISSA}
                  2019, Johannesburg, South Africa, August 15, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1166},
  pages        = {69--82},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43276-8\_6},
  doi          = {10.1007/978-3-030-43276-8\_6},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/ZazazaVS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2018s,
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Information Security - 17th International Conference, {ISSA} 2018,
                  Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {973},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-11407-7},
  doi          = {10.1007/978-3-030-11407-7},
  isbn         = {978-3-030-11406-0},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/2018s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Frauenstein18,
  author       = {Edwin Donald Frauenstein},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {An Investigation into Students Responses to Various Phishing Emails
                  and Other Phishing-Related Behaviours},
  booktitle    = {Information Security - 17th International Conference, {ISSA} 2018,
                  Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {973},
  pages        = {44--59},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11407-7\_4},
  doi          = {10.1007/978-3-030-11407-7\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Frauenstein18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Haar18,
  author       = {Dustin Terence van der Haar},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Real-Time Face Antispoofing Using Shearlets},
  booktitle    = {Information Security - 17th International Conference, {ISSA} 2018,
                  Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {973},
  pages        = {16--29},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11407-7\_2},
  doi          = {10.1007/978-3-030-11407-7\_2},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Haar18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/LoskutovaP18,
  author       = {Tetyana Loskutova and
                  Rivaj Parbhu},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Information Availability and Security in Foreign Corrupt Practices
                  Act Investigations},
  booktitle    = {Information Security - 17th International Conference, {ISSA} 2018,
                  Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {973},
  pages        = {60--75},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11407-7\_5},
  doi          = {10.1007/978-3-030-11407-7\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/LoskutovaP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ManjeziB18,
  author       = {Zandile Manjezi and
                  Reinhardt A. Botha},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Preventing and Mitigating Ransomware - {A} Systematic Literature Review},
  booktitle    = {Information Security - 17th International Conference, {ISSA} 2018,
                  Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {973},
  pages        = {149--162},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11407-7\_11},
  doi          = {10.1007/978-3-030-11407-7\_11},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ManjeziB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MaonekeF18,
  author       = {Pardon Blessings Maoneke and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Password Policies Adopted by South African Organizations: Influential
                  Factors and Weaknesses},
  booktitle    = {Information Security - 17th International Conference, {ISSA} 2018,
                  Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {973},
  pages        = {30--43},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11407-7\_3},
  doi          = {10.1007/978-3-030-11407-7\_3},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MaonekeF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MoyoL18,
  author       = {Moses Moyo and
                  Marianne Loock},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Small and Medium-Sized Enterprises' Understanding of Security Evaluation
                  of Cloud-Based Business Intelligence Systems and Its Challenges},
  booktitle    = {Information Security - 17th International Conference, {ISSA} 2018,
                  Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {973},
  pages        = {133--148},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11407-7\_10},
  doi          = {10.1007/978-3-030-11407-7\_10},
  timestamp    = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MoyoL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NiekerkE18,
  author       = {Jan Hendrik van Niekerk and
                  Elizabeth Marie Ehlers},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {{SA-EF} Cube: An Evaluation Framework for Assessing Intelligent Context-Aware
                  Critical Information Infrastructure Protection Solutions},
  booktitle    = {Information Security - 17th International Conference, {ISSA} 2018,
                  Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {973},
  pages        = {115--132},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11407-7\_9},
  doi          = {10.1007/978-3-030-11407-7\_9},
  timestamp    = {Wed, 06 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/NiekerkE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OphoffL18,
  author       = {Jacques Ophoff and
                  Mcguigan Lakay},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Mitigating the Ransomware Threat: {A} Protection Motivation Theory
                  Approach},
  booktitle    = {Information Security - 17th International Conference, {ISSA} 2018,
                  Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {973},
  pages        = {163--175},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11407-7\_12},
  doi          = {10.1007/978-3-030-11407-7\_12},
  timestamp    = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/OphoffL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ParkerB18,
  author       = {Amaanullah Parker and
                  Irwin Brown},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Skills Requirements for Cyber Security Professionals: {A} Content
                  Analysis of Job Descriptions in South Africa},
  booktitle    = {Information Security - 17th International Conference, {ISSA} 2018,
                  Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {973},
  pages        = {176--192},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11407-7\_13},
  doi          = {10.1007/978-3-030-11407-7\_13},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ParkerB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/PieterseOH18,
  author       = {Heloise Pieterse and
                  Martin S. Olivier and
                  Renier van Heerden},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Detecting Manipulated Smartphone Data on Android and iOS Devices},
  booktitle    = {Information Security - 17th International Conference, {ISSA} 2018,
                  Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {973},
  pages        = {89--103},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11407-7\_7},
  doi          = {10.1007/978-3-030-11407-7\_7},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/PieterseOH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Verkijika18,
  author       = {Silas Formunyuy Verkijika},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {An Evaluation of the Password Practices on Leading e-Commerce Websites
                  in South Africa},
  booktitle    = {Information Security - 17th International Conference, {ISSA} 2018,
                  Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {973},
  pages        = {104--114},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11407-7\_8},
  doi          = {10.1007/978-3-030-11407-7\_8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Verkijika18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/WeilbachM18,
  author       = {William Thomas Weilbach and
                  Yusuf Moosa Motara},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Distributed Ledger Technology to Support Digital Evidence Integrity
                  Verification Processes},
  booktitle    = {Information Security - 17th International Conference, {ISSA} 2018,
                  Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {973},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11407-7\_1},
  doi          = {10.1007/978-3-030-11407-7\_1},
  timestamp    = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/WeilbachM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ZazazaVS18,
  author       = {Lelethu Zazaza and
                  H. S. Venter and
                  George Sibiya},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {The Current State of Electronic Consent Systems in e-Health for Privacy
                  Preservation},
  booktitle    = {Information Security - 17th International Conference, {ISSA} 2018,
                  Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {973},
  pages        = {76--88},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11407-7\_6},
  doi          = {10.1007/978-3-030-11407-7\_6},
  timestamp    = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ZazazaVS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/AldabbasTT17,
  author       = {Mohammad Aldabbas and
                  Stephanie Teufel and
                  Bernd Teufel},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {The importance of security culture for crowd energy systems},
  booktitle    = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg,
                  South Africa, August 16-17, 2017},
  pages        = {10--15},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISSA.2017.8251783},
  doi          = {10.1109/ISSA.2017.8251783},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/AldabbasTT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ChaipaE17,
  author       = {Sarathiel Chaipa and
                  Mariki M. Eloff},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Towards the development of an effective intrusion detection model},
  booktitle    = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg,
                  South Africa, August 16-17, 2017},
  pages        = {32--39},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISSA.2017.8251772},
  doi          = {10.1109/ISSA.2017.8251772},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/ChaipaE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/FrieslaarI17,
  author       = {Ibraheem Frieslaar and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Investigating the electromagnetic side channel leakage from a Raspberry
                  Pi},
  booktitle    = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg,
                  South Africa, August 16-17, 2017},
  pages        = {24--31},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISSA.2017.8251771},
  doi          = {10.1109/ISSA.2017.8251771},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/FrieslaarI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HaugerO17,
  author       = {Werner K. Hauger and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Forensic attribution in NoSQL databases},
  booktitle    = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg,
                  South Africa, August 16-17, 2017},
  pages        = {74--82},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISSA.2017.8251777},
  doi          = {10.1109/ISSA.2017.8251777},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/HaugerO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KenyonE17,
  author       = {David Kenyon and
                  Jan H. P. Eloff},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Big data science for predicting insurance claims fraud},
  booktitle    = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg,
                  South Africa, August 16-17, 2017},
  pages        = {40--47},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISSA.2017.8251773},
  doi          = {10.1109/ISSA.2017.8251773},
  timestamp    = {Wed, 17 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KenyonE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MnjamaFI17,
  author       = {Javan Mnjama and
                  Greg Foster and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {A privacy and security threat assessment framework for consumer health
                  wearables},
  booktitle    = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg,
                  South Africa, August 16-17, 2017},
  pages        = {66--73},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISSA.2017.8251776},
  doi          = {10.1109/ISSA.2017.8251776},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MnjamaFI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MoutonNLV17,
  author       = {Francois Mouton and
                  Alastair Nottingham and
                  Louise Leenen and
                  H. S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Underlying finite state machine for the social engineering attack
                  detection model},
  booktitle    = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg,
                  South Africa, August 16-17, 2017},
  pages        = {98--105},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISSA.2017.8251781},
  doi          = {10.1109/ISSA.2017.8251781},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MoutonNLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MoutonTM17,
  author       = {Francois Mouton and
                  Marcel Teixeira and
                  Thomas Meyer},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Benchmarking a mobile implementation of the social engineering prevention
                  training tool},
  booktitle    = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg,
                  South Africa, August 16-17, 2017},
  pages        = {106--116},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISSA.2017.8251782},
  doi          = {10.1109/ISSA.2017.8251782},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MoutonTM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MpofuS17,
  author       = {Nkosinathi Mpofu and
                  Wynand J. C. van Staden},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Evaluating the severity of trust to identity- management-as-a-service},
  booktitle    = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg,
                  South Africa, August 16-17, 2017},
  pages        = {83--89},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISSA.2017.8251778},
  doi          = {10.1109/ISSA.2017.8251778},
  timestamp    = {Wed, 17 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MpofuS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/PelteretO17,
  author       = {Marc Pelteret and
                  Jacques Ophoff},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Organizational information privacy strategy and the impact of the
                  PoPI act},
  booktitle    = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg,
                  South Africa, August 16-17, 2017},
  pages        = {56--65},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISSA.2017.8251775},
  doi          = {10.1109/ISSA.2017.8251775},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/PelteretO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/PennefatherI17,
  author       = {Sean Pennefather and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Design and application of link: {A} {DSL} for network frame manipulation},
  booktitle    = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg,
                  South Africa, August 16-17, 2017},
  pages        = {48--55},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISSA.2017.8251774},
  doi          = {10.1109/ISSA.2017.8251774},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/PennefatherI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/RenaudZ17,
  author       = {Karen Renaud and
                  Verena Zimmermann},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Enriched nudges lead to stronger password replacements ... but implement
                  mindfully},
  booktitle    = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg,
                  South Africa, August 16-17, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISSA.2017.8251779},
  doi          = {10.1109/ISSA.2017.8251779},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/RenaudZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/VeigaVPA17,
  author       = {Ad{\'{e}}le da Veiga and
                  Ruthea Vorster and
                  Colin Pilkington and
                  Hanifa Abdullah},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Compliance with the protection of personal information act and consumer
                  privacy expectations: {A} comparison between the retail and medical
                  aid industry},
  booktitle    = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg,
                  South Africa, August 16-17, 2017},
  pages        = {16--23},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISSA.2017.8251784},
  doi          = {10.1109/ISSA.2017.8251784},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/VeigaVPA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/VumoSK17,
  author       = {Ambrosio Patricio Vumo and
                  Josef Spillner and
                  Stefan K{\"{o}}psell},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Analysis of Mozambican websites: How do they protect their users?},
  booktitle    = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg,
                  South Africa, August 16-17, 2017},
  pages        = {90--97},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISSA.2017.8251780},
  doi          = {10.1109/ISSA.2017.8251780},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/VumoSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2017,
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {2017 Information Security for South Africa, {ISSA} 2017, Johannesburg,
                  South Africa, August 16-17, 2017},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8240063/proceeding},
  isbn         = {978-1-5386-0545-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/DelportGS16,
  author       = {Petrus M. J. Delport and
                  Mariana Gerber and
                  Nader Sohrabi Safa},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {An interactive visual library model to improve awareness in handling
                  of business information},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {18--26},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802924},
  doi          = {10.1109/ISSA.2016.7802924},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/DelportGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ElaswadJ16,
  author       = {Othoman Elaswad and
                  Christian Damsgaard Jensen},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Identity management for e-government Libya as a case study},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {106--113},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802936},
  doi          = {10.1109/ISSA.2016.7802936},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/ElaswadJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/FaniSG16,
  author       = {Noluvuyo Fani and
                  Rossouw von Solms and
                  Mariana Gerber},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {A framework towards governing "Bring Your Own Device in SMMEs"},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802922},
  doi          = {10.1109/ISSA.2016.7802922},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/FaniSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/FrauensteinF16,
  author       = {Edwin Donald Frauenstein and
                  Stephen V. Flowerday},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Social network phishing: Becoming habituated to clicks and ignorant
                  to threats?},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {98--105},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802935},
  doi          = {10.1109/ISSA.2016.7802935},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/FrauensteinF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HerbertI16,
  author       = {Alan Herbert and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Adaptable exploit detection through scalable NetFlow analysis},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {121--128},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802938},
  doi          = {10.1109/ISSA.2016.7802938},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/HerbertI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KockF16,
  author       = {Ryan De Kock and
                  Lynn Ann Futcher},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Mobile device usage in higher education institutions in South Africa},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {27--34},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802925},
  doi          = {10.1109/ISSA.2016.7802925},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/KockF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MasangoMNM16,
  author       = {Mfundo Glenn Masango and
                  Francois Mouton and
                  Alastair Nottingham and
                  Jabu Mtsweni},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Context Aware Mobile Application for mobile devices},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {85--90},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802933},
  doi          = {10.1109/ISSA.2016.7802933},
  timestamp    = {Sat, 30 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MasangoMNM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MejaeleO16,
  author       = {Lineo Mejaele and
                  Elisha Oketch Ochola},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Effect of varying node mobility in the analysis of black hole attack
                  on {MANET} reactive routing protocols},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {62--68},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802930},
  doi          = {10.1109/ISSA.2016.7802930},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MejaeleO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MonamoMT16,
  author       = {Patrick Monamo and
                  Vukosi Marivate and
                  Bheki Twala},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Unsupervised learning for robust Bitcoin fraud detection},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {129--134},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802939},
  doi          = {10.1109/ISSA.2016.7802939},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MonamoMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MotaraI16,
  author       = {Yusuf Moosa Motara and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {{SHA-1} and the Strict Avalanche Criterion},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {35--40},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802926},
  doi          = {10.1109/ISSA.2016.7802926},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MotaraI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OlisahO16,
  author       = {Chollette C. Olisah and
                  Peter Ogedebe},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Recognizing surgically altered faces using local edge gradient Gabor
                  magnitude pattern},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {114--120},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802937},
  doi          = {10.1109/ISSA.2016.7802937},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/OlisahO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/RudmanI16,
  author       = {Lauren Rudman and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Dridex: Analysis of the traffic and automatic generation of IOCs},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {77--84},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802932},
  doi          = {10.1109/ISSA.2016.7802932},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/RudmanI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SamuelP16,
  author       = {J. N. Samuel and
                  Warren P. Du Plessis},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Specific emitter identification for enhanced access control security},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {41--47},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802927},
  doi          = {10.1109/ISSA.2016.7802927},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SamuelP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ScharnickGF16,
  author       = {Nicholas Scharnick and
                  Mariana Gerber and
                  Lynn Futcher},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Review of data storage protection approaches for {POPI} compliance},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {48--55},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802928},
  doi          = {10.1109/ISSA.2016.7802928},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/ScharnickGF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/StadenP16,
  author       = {Wynand J. C. van Staden and
                  Etienne van der Poel},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Team formation in digital forensics},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {91--97},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802934},
  doi          = {10.1109/ISSA.2016.7802934},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/StadenP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SwartzV16,
  author       = {Paulus Swartz and
                  Ad{\'{e}}le da Veiga},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {PoPI Act - opt-in and opt-out compliance from a data value chain perspective:
                  {A} South African insurance industry experiment},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {9--17},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802923},
  doi          = {10.1109/ISSA.2016.7802923},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SwartzV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/VorsterHI16,
  author       = {Johannes S. Vorster and
                  Renier P. van Heerden and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {The pattern-richness of Graphical passwords},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {69--76},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802931},
  doi          = {10.1109/ISSA.2016.7802931},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/VorsterHI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/WojuolaMS16,
  author       = {Olanrewaju B. Wojuola and
                  Stanley H. Mneney and
                  Viranjay M. Srivastava},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {{CDMA} in signal encryption and information security},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {56--61},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802929},
  doi          = {10.1109/ISSA.2016.7802929},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/WojuolaMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2016,
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7786562/proceeding},
  isbn         = {978-1-5090-2473-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BothaES15,
  author       = {J. G. Botha and
                  Mariki M. Eloff and
                  I. Swart},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {The effects of the PoPI Act on small and medium enterprises in South
                  Africa},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335054},
  doi          = {10.1109/ISSA.2015.7335054},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/BothaES15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Govender15,
  author       = {Irene Govender},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Mapping 'Security Safeguard' Requirements in a data privacy legislation
                  to an international privacy framework: {A} compliance methodology},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335062},
  doi          = {10.1109/ISSA.2015.7335062},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Govender15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GreavesC15,
  author       = {Brian Greaves and
                  Marijke Coetzee},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Access control for local personal smart spaces},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335056},
  doi          = {10.1109/ISSA.2015.7335056},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/GreavesC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HaugerO15,
  author       = {Werner K. Hauger and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {The state of database forensic research},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335071},
  doi          = {10.1109/ISSA.2015.7335071},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/HaugerO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HerreraJ15,
  author       = {Andrea Herrera and
                  Lech J. Janczewski},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Cloud supply chain resilience},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335076},
  doi          = {10.1109/ISSA.2015.7335076},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/HerreraJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/InglesVV15,
  author       = {Melissa Ingles and
                  Aleksandar Valjarevic and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Evaluation and analysis of a software prototype for guidance and implementation
                  of a standardized digital forensic investigation process},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335052},
  doi          = {10.1109/ISSA.2015.7335052},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/InglesVV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/JordaanB15,
  author       = {Jason Jordaan and
                  Karen L. Bradshaw},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {The current state of digital forensic practitioners in South Africa},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335068},
  doi          = {10.1109/ISSA.2015.7335068},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/JordaanB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KebandeV15,
  author       = {Victor R. Kebande and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Adding event reconstruction to a Cloud Forensic Readiness model},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335050},
  doi          = {10.1109/ISSA.2015.7335050},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/KebandeV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/LubbeO15,
  author       = {Luke Lubbe and
                  Martin Oliver},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Beacons and their uses for digital forensics purposes},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335074},
  doi          = {10.1109/ISSA.2015.7335074},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/LubbeO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MahopoAM15,
  author       = {Bessy Mahopo and
                  Hanifa Abdullah and
                  Mathias Mujinga},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {A formal qualitative risk management approach for {IT} security},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335053},
  doi          = {10.1109/ISSA.2015.7335053},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MahopoAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MasvosvereV15,
  author       = {D. J. E. Masvosvere and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {A model for the design of next generation e-supply chain digital forensic
                  readiness tools},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335075},
  doi          = {10.1109/ISSA.2015.7335075},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MasvosvereV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MayayiseO15,
  author       = {Thembekile O. Mayayise and
                  Isaac Olusegun Osunmakinde},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Robustness of computational intelligent assurance models when assessing
                  e-Commerce sites},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335067},
  doi          = {10.1109/ISSA.2015.7335067},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MayayiseO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MerweS15,
  author       = {Mc Donald Van der Merwe and
                  Wynand J. C. van Staden},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Unsolicited Short Message Service marketing: {A} preliminary investigation
                  into individual acceptance, perceptions of content, and privacy concerns},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335072},
  doi          = {10.1109/ISSA.2015.7335072},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MerweS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MooiB15,
  author       = {Roderick Mooi and
                  Reinhardt A. Botha},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Prerequisites for building a Computer Security Incident Response capability},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335057},
  doi          = {10.1109/ISSA.2015.7335057},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MooiB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Morkel15,
  author       = {Tayana Morkel},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Self-sanitization of digital images using steganography},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335073},
  doi          = {10.1109/ISSA.2015.7335073},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Morkel15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Mtsweni15,
  author       = {Jabu Mtsweni},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Analyzing the security posture of South African websites},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335063},
  doi          = {10.1109/ISSA.2015.7335063},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Mtsweni15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MunteanRIE15,
  author       = {Paul Muntean and
                  Mustafizur Rahman and
                  Andreas Ibing and
                  Claudia Eckert},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {SMT-constrained symbolic execution engine for integer overflow detection
                  in {C} code},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335070},
  doi          = {10.1109/ISSA.2015.7335070},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MunteanRIE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NairHM15,
  author       = {Kishor Krishnan Nair and
                  Albert Helberg and
                  Johan Van Der Merwe},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Intrusion detection in Bluetooth enabled mobile phones},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335048},
  doi          = {10.1109/ISSA.2015.7335048},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/NairHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NaudeD15,
  author       = {Jared Naude and
                  Lynette Drevin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {The adversarial threat posed by the {NSA} to the integrity of the
                  internet},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335060},
  doi          = {10.1109/ISSA.2015.7335060},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/NaudeD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Olivier15,
  author       = {Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Towards a digital forensic science},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335077},
  doi          = {10.1109/ISSA.2015.7335077},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Olivier15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Padayachee15,
  author       = {Keshnee Padayachee},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {A framework of opportunity-reducing techniques to mitigate the insider
                  threat},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335064},
  doi          = {10.1109/ISSA.2015.7335064},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Padayachee15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/PieterseOH15,
  author       = {Heloise Pieterse and
                  Martin S. Olivier and
                  Renier P. van Heerden},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Playing hide-and-seek: Detecting the manipulation of Android Timestamps},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335065},
  doi          = {10.1109/ISSA.2015.7335065},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/PieterseOH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/RamotsoelaH15,
  author       = {T. D. Ramotsoela and
                  Gerhard P. Hancke},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Data aggregation using homomorphic encryption in wireless sensor networks},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335058},
  doi          = {10.1109/ISSA.2015.7335058},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/RamotsoelaH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/RenaudHS15,
  author       = {Karen Renaud and
                  Andrew Hoskins and
                  Rossouw von Solms},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Biometric identification: Are we ethically ready?},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335051},
  doi          = {10.1109/ISSA.2015.7335051},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/RenaudHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/RudmanI15,
  author       = {Lauren Rudman and
                  Barry V. W. Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Characterization and analysis of {NTP} amplification based DDoS attacks},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335069},
  doi          = {10.1109/ISSA.2015.7335069},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/RudmanI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SavolaSEAS15,
  author       = {Reijo M. Savola and
                  Pekka Savolainen and
                  Antti Evesti and
                  Habtamu Abie and
                  Markus Sihvonen},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Risk-driven security metrics development for an e-health IoT application},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335061},
  doi          = {10.1109/ISSA.2015.7335061},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SavolaSEAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SkolmenG15,
  author       = {Dayne Edward Skolmen and
                  Mariana Gerber},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Protection of Personal Information in the South African Cloud Computing
                  environment: {A} framework for Cloud Computing adoption},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335049},
  doi          = {10.1109/ISSA.2015.7335049},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SkolmenG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SmithC15,
  author       = {Gregory Stuart Smith and
                  Marijke Coetzee},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {{AFA-RFID:} Physical layer authentication for passive {RFID} tags},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335078},
  doi          = {10.1109/ISSA.2015.7335078},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SmithC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Solms15,
  author       = {Sun{\'{e}} von Solms},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {An investigation into credit card information disclosure through Point
                  of Sale purchases},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335055},
  doi          = {10.1109/ISSA.2015.7335055},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Solms15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ToitE15,
  author       = {Jaco du Toit and
                  Ian Ellefsen},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Location aware mobile device management},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335059},
  doi          = {10.1109/ISSA.2015.7335059},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ToitE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/VenterLCE15,
  author       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Introduction},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335042},
  doi          = {10.1109/ISSA.2015.7335042},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/VenterLCE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Watney15,
  author       = {Murdoch Watney},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {State-on-nationals' electronic communication surveillance in South
                  Africa: {A} murky legal landscape to navigate?},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335047},
  doi          = {10.1109/ISSA.2015.7335047},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Watney15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/WrenchI15,
  author       = {Peter M. Wrench and
                  Barry V. W. Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Towards a {PHP} webshell taxonomy using deobfuscation-assisted similarity
                  analysis},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335066},
  doi          = {10.1109/ISSA.2015.7335066},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/WrenchI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2015,
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7328027/proceeding},
  isbn         = {978-1-4799-7755-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/AllyBN14,
  author       = {Sayed Enayat Sayed Ally and
                  Craig Blewett and
                  Brett van Niekerk},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Facebook: The risk-taking attitude amongst Emerging Adults},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950515},
  doi          = {10.1109/ISSA.2014.6950515},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/AllyBN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Castillo14,
  author       = {Juan{-}Camilo Castillo},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {The Mexican Cartels' employment of Inform and Influence Activities
                  {(IIA)} as tools of asymmetrical warfare},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950512},
  doi          = {10.1109/ISSA.2014.6950512},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Castillo14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/CoertzeS14,
  author       = {Jacques Coertze and
                  Rossouw von Solms},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {The murky waters of {IT} governance},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950498},
  doi          = {10.1109/ISSA.2014.6950498},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/CoertzeS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/FrauensteinS14,
  author       = {Edwin Donald Frauenstein and
                  Rossouw von Solms},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Combatting phishing: {A} holistic human approach},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950508},
  doi          = {10.1109/ISSA.2014.6950508},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/FrauensteinS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HaffejeeI14,
  author       = {Jameel Haffejee and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Testing antivirus engines to determine their effectiveness as a security
                  layer},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950496},
  doi          = {10.1109/ISSA.2014.6950496},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/HaffejeeI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HaugerO14,
  author       = {Werner K. Hauger and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {The role of triggers in database forensics},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950506},
  doi          = {10.1109/ISSA.2014.6950506},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/HaugerO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HindeO14,
  author       = {Charlie Hinde and
                  Jacques Ophoff},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Privacy: {A} review of publication trends},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950499},
  doi          = {10.1109/ISSA.2014.6950499},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/HindeO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KearneyK14,
  author       = {Wayne D. Kearney and
                  Hennie A. Kruger},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Considering the influence of human trust in practical social engineering
                  exercises},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950509},
  doi          = {10.1109/ISSA.2014.6950509},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/KearneyK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KhanM14,
  author       = {Zubeida Casmod Khan and
                  Thulani Mashiane},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {An analysis of Facebook's graph search},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950517},
  doi          = {10.1109/ISSA.2014.6950517},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/KhanM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Kritzinger14,
  author       = {Elmarie Kritzinger},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Online safety in South Africa - {A} cause for growing concern},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950502},
  doi          = {10.1109/ISSA.2014.6950502},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Kritzinger14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KuntzeRH14,
  author       = {Nicolai Kuntze and
                  Carsten Rudolph and
                  Oliver Hanka},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Security foundation for a distributed cabin core architecture},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950487},
  doi          = {10.1109/ISSA.2014.6950487},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/KuntzeRH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MadzimaMA14,
  author       = {Kudakwashe Madzima and
                  Moses Moyo and
                  Hanifa Abdullah},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Is bring your own device an institutional information security risk
                  for small-scale business organisations?},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950497},
  doi          = {10.1109/ISSA.2014.6950497},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MadzimaMA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MirzaSPN14,
  author       = {Abdul Mirza and
                  Makhamisa Senekane and
                  Francesco Petruccione and
                  Brett van Niekerk},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Suitability of quantum cryptography for national facilities},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950513},
  doi          = {10.1109/ISSA.2014.6950513},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MirzaSPN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MogaleGCS14,
  author       = {Miemie Mogale and
                  Mariana Gerber and
                  Mariana Carroll and
                  Rossouw von Solms},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Information Security Assurance Model {(ISAM)} for an Examination Paper
                  Preparation Process},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950505},
  doi          = {10.1109/ISSA.2014.6950505},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MogaleGCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MoutonMLV14,
  author       = {Francois Mouton and
                  Mercia M. Malan and
                  Louise Leenen and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Social engineering attack framework},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950510},
  doi          = {10.1109/ISSA.2014.6950510},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MoutonMLV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MpofuS14,
  author       = {Nkosinathi Mpofu and
                  Wynand J. C. van Staden},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {A survey of trust issues constraining the growth of Identity Management-as-a-Service(IdMaaS)},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950490},
  doi          = {10.1109/ISSA.2014.6950490},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MpofuS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MumbaV14,
  author       = {Emilio Raymond Mumba and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Mobile forensics using the harmonised digital forensic investigation
                  process},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950491},
  doi          = {10.1109/ISSA.2014.6950491},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MumbaV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OphoffR14,
  author       = {Jacques Ophoff and
                  Mark Robinson},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Exploring end-user smartphone security awareness within a South African
                  context},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950500},
  doi          = {10.1109/ISSA.2014.6950500},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/OphoffR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/PennefatherI14,
  author       = {Sean Pennefather and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {An exploration of geolocation and traffic visualisation using network
                  flows},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950507},
  doi          = {10.1109/ISSA.2014.6950507},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/PennefatherI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Plessis14,
  author       = {Warren P. Du Plessis},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Software-defined radio {(SDR)} as a mechanism for exploring cyber-electronic
                  warfare {(EW)} collaboration},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950516},
  doi          = {10.1109/ISSA.2014.6950516},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Plessis14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ReidN14,
  author       = {Rayne Reid and
                  Johan Van Niekerk},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {From information security to cyber security cultures},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950492},
  doi          = {10.1109/ISSA.2014.6950492},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/ReidN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ReidNR14,
  author       = {Rayne Reid and
                  Johan Van Niekerk and
                  Karen Renaud},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Information security culture: {A} general living systems theory perspective},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950493},
  doi          = {10.1109/ISSA.2014.6950493},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/ReidNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Robertson14,
  author       = {Jaco Robertson},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Integrity of a common operating picture in military situational awareness},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950514},
  doi          = {10.1109/ISSA.2014.6950514},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Robertson14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SavolaK14,
  author       = {Reijo M. Savola and
                  Markku Kyl{\"{a}}np{\"{a}}{\"{a}}},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Security objectives, controls and metrics development for an Android
                  smartphone application},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950501},
  doi          = {10.1109/ISSA.2014.6950501},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SavolaK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SchnarzFWS14,
  author       = {Pierre Schnarz and
                  Clemens Fischer and
                  Joachim Wietzke and
                  Ingo Stengel},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {On a domain block based mechanism to mitigate DoS attacks on shared
                  caches in asymmetric multiprocessing multi operating systems},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950494},
  doi          = {10.1109/ISSA.2014.6950494},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SchnarzFWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Staden14,
  author       = {Wynand J. C. van Staden},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {An investigation into reducing third party privacy breaches during
                  the investigation of cybercrime},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950503},
  doi          = {10.1109/ISSA.2014.6950503},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Staden14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SwartIG14,
  author       = {Ignus P. Swart and
                  Barry Irwin and
                  Marthie Grobler},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Towards a platform to visualize the state of South Africa's information
                  security},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950511},
  doi          = {10.1109/ISSA.2014.6950511},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SwartIG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/TekeniTB14,
  author       = {Luzuko Tekeni and
                  Kerry{-}Lynn Thomson and
                  Reinhardt A. Botha},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Concerns regarding service authorization by {IP} address using eduroam},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950495},
  doi          = {10.1109/ISSA.2014.6950495},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/TekeniTB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/TrenwithV14,
  author       = {Philip M. Trenwith and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {A digital forensic model for providing better data provenance in the
                  cloud},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950489},
  doi          = {10.1109/ISSA.2014.6950489},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/TrenwithV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ValjarevicVI14,
  author       = {Aleksandar Valjarevic and
                  Hein S. Venter and
                  Melissa Ingles},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Towards a prototype for guidance and implementation of a standardized
                  digital forensic investigation process},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950488},
  doi          = {10.1109/ISSA.2014.6950488},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ValjarevicVI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/VenterLCE14,
  author       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Introduction},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950482},
  doi          = {10.1109/ISSA.2014.6950482},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/VenterLCE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/WrenchI14,
  author       = {Peter M. Wrench and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Towards a sandbox for the deobfuscation and dissection of {PHP} malware},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950504},
  doi          = {10.1109/ISSA.2014.6950504},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/WrenchI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2014,
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6940061/proceeding},
  isbn         = {978-1-4799-3384-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Al-MutairiW13,
  author       = {Abdulrahman Al{-}Mutairi and
                  Stephen D. Wolthusen},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {An analysis of service degradation attacks against real-time {MPLS}
                  networks},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641057},
  doi          = {10.1109/ISSA.2013.6641057},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Al-MutairiW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/CoertzeS13,
  author       = {Jacques Coertze and
                  Rossouw von Solms},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {A software gateway to affordable and effective Information Security
                  Governance in SMMEs},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641035},
  doi          = {10.1109/ISSA.2013.6641035},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/CoertzeS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/EsanNO13,
  author       = {Omobayo A. Esan and
                  Seleman M. Ngwira and
                  Isaac Olusegun Osunmakinde},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Bimodal biometrics for financial infrastructure security},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641045},
  doi          = {10.1109/ISSA.2013.6641045},
  timestamp    = {Mon, 29 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/EsanNO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/FahdiCF13,
  author       = {M. Al Fahdi and
                  Nathan L. Clarke and
                  Steven M. Furnell},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Challenges to digital forensics: {A} survey of researchers {\&}
                  practitioners attitudes and opinions},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641058},
  doi          = {10.1109/ISSA.2013.6641058},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/FahdiCF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HaarGP13,
  author       = {Helen van de Haar and
                  Darelle van Greunen and
                  Dalenca Pottas},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {The characteristics of a biometric},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641037},
  doi          = {10.1109/ISSA.2013.6641037},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/HaarGP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HerbertI13,
  author       = {Alan Herbert and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {A kernel-driven framework for high performance internet routing simulation},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641048},
  doi          = {10.1109/ISSA.2013.6641048},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/HerbertI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HillebrandC13,
  author       = {Channel Hillebrand and
                  Marijke Coetzee},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Towards Reputation-as-a-Service},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641047},
  doi          = {10.1109/ISSA.2013.6641047},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/HillebrandC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HunterIS13,
  author       = {Samuel Oswald Hunter and
                  Barry Irwin and
                  Etienne Stalmans},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Real-time distributed malicious traffic monitoring for honeypots and
                  network telescopes},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641050},
  doi          = {10.1109/ISSA.2013.6641050},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/HunterIS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/JacobsAI13,
  author       = {Pierre Jacobs and
                  Alapan Arnab and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Classification of Security Operation Centers},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641054},
  doi          = {10.1109/ISSA.2013.6641054},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/JacobsAI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KarieV13,
  author       = {Nickson M. Karie and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Towards a framework for enhancing potential digital evidence presentation},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641039},
  doi          = {10.1109/ISSA.2013.6641039},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/KarieV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MayayiseO13,
  author       = {Thembekile O. Mayayise and
                  Isaac Olusegun Osunmakinde},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {A compliant assurance model for assessing the trustworthiness of cloud-based
                  e-commerce systems},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641042},
  doi          = {10.1109/ISSA.2013.6641042},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MayayiseO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MoutonE13,
  author       = {Jean Mouton and
                  Ian Ellefsen},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {The identification of information sources to aid with Critical Information
                  Infrastructure Protection},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641038},
  doi          = {10.1109/ISSA.2013.6641038},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MoutonE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MoutonMV13,
  author       = {Francois Mouton and
                  Mercia M. Malan and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Social engineering from a normative ethics perspective},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641064},
  doi          = {10.1109/ISSA.2013.6641064},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MoutonMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MoyoAN13,
  author       = {Moses Moyo and
                  Hanifa Abdullah and
                  Rita C. Nienaber},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Information security risk management in small-scale organisations:
                  {A} case study of secondary schools computerised information systems},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641062},
  doi          = {10.1109/ISSA.2013.6641062},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MoyoAN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NkosiTA13,
  author       = {Lucky Nkosi and
                  Paul Tarwireyi and
                  Matthew O. Adigun},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Insider threat detection model for the cloud},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641040},
  doi          = {10.1109/ISSA.2013.6641040},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/NkosiTA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NottinghamI13,
  author       = {Alastair Nottingham and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {A high-level architecture for efficient packet trace analysis on {GPU}
                  co-processors},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641052},
  doi          = {10.1109/ISSA.2013.6641052},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/NottinghamI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OcholaEP13,
  author       = {Elisha O. Ochola and
                  Mariki M. Eloff and
                  John A. van der Poll},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Democratic detection of malicious behaviour in {MANET:} {A} voting
                  process},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641051},
  doi          = {10.1109/ISSA.2013.6641051},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/OcholaEP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OmelezeV13,
  author       = {Stacey Omeleze and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Testing the harmonised digital forensic investigation process model-using
                  an Android mobile phone},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641063},
  doi          = {10.1109/ISSA.2013.6641063},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/OmelezeV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Padayachee13,
  author       = {Keshnee Padayachee},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {A conceptual opportunity-based framework to mitigate the insider threat},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641060},
  doi          = {10.1109/ISSA.2013.6641060},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Padayachee13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/PieterseO13,
  author       = {Heloise Pieterse and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Security steps for smartphone users},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641036},
  doi          = {10.1109/ISSA.2013.6641036},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/PieterseO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/RenaudKNM13,
  author       = {Karen Renaud and
                  Demetris Kennes and
                  Johan Van Niekerk and
                  Joe Maguire},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {{SNIPPET:} Genuine knowledge-based authentication},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641059},
  doi          = {10.1109/ISSA.2013.6641059},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/RenaudKNM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SalvaZ13,
  author       = {S{\'{e}}bastien Salva and
                  Stassia R. Zafimiharisoa},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Data vulnerability detection by security testing for Android applications},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641043},
  doi          = {10.1109/ISSA.2013.6641043},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SalvaZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SavolaVESKK13,
  author       = {Reijo M. Savola and
                  Teemu V{\"{a}}is{\"{a}}nen and
                  Antti Evesti and
                  Pekka Savolainen and
                  Juha Kemppainen and
                  Marko Kokemaki},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Toward risk-driven security measurement for Android smartphone platforms},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641049},
  doi          = {10.1109/ISSA.2013.6641049},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SavolaVESKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Schoeman13,
  author       = {Adam Schoeman},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Amber: {A} zero-interaction honeypot and network enforcer with modular
                  intelligence},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641053},
  doi          = {10.1109/ISSA.2013.6641053},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Schoeman13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ShavaG13,
  author       = {Fungai Bhunu Shava and
                  Darelle van Greunen},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Factors affecting user experience with security features: {A} case
                  study of an academic institution in Namibia},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641061},
  doi          = {10.1109/ISSA.2013.6641061},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ShavaG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SibiyaFV13,
  author       = {George Sibiya and
                  Thomas Fogwill and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Selection and ranking of remote hosts for digital forensic investigation
                  in a Cloud environment},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641044},
  doi          = {10.1109/ISSA.2013.6641044},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SibiyaFV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SwartGI13,
  author       = {Ignus P. Swart and
                  Marthie Grobler and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Visualization of a data leak},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641046},
  doi          = {10.1109/ISSA.2013.6641046},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SwartGI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/TrenwithV13,
  author       = {Philip M. Trenwith and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Digital forensic readiness in the cloud},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641055},
  doi          = {10.1109/ISSA.2013.6641055},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/TrenwithV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ValjarevicV13,
  author       = {Aleksandar Valjarevic and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Implementation guidelines for a harmonised digital forensic investigation
                  readiness process model},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641041},
  doi          = {10.1109/ISSA.2013.6641041},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ValjarevicV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/VenterLC13,
  author       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Introduction},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641030},
  doi          = {10.1109/ISSA.2013.6641030},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/VenterLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/WestonW13,
  author       = {Peter Weston and
                  Stephen D. Wolthusen},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Forensic entropy analysis of microsoft windows storage volumes},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641056},
  doi          = {10.1109/ISSA.2013.6641056},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/WestonW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2013,
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6621627/proceeding},
  isbn         = {978-1-4799-0808-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/AzeezV12,
  author       = {Nureni Ayofe Azeez and
                  Isabella Margarethe Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Towards achieving scalability and interoperability in a triple-domain
                  grid-based environment {(3DGBE)}},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320440},
  doi          = {10.1109/ISSA.2012.6320440},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/AzeezV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BreitingerB12,
  author       = {Frank Breitinger and
                  Harald Baier},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Properties of a similarity preserving hash function and their realization
                  in sdhash},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320445},
  doi          = {10.1109/ISSA.2012.6320445},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/BreitingerB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/CorregedorS12,
  author       = {Manuel Corregedor and
                  Sebastiaan H. von Solms},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {{ATE:} Anti-malware technique evaluator},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320444},
  doi          = {10.1109/ISSA.2012.6320444},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/CorregedorS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Croft12,
  author       = {Neil J. Croft},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {On forensics: {A} silent {SMS} attack},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320454},
  doi          = {10.1109/ISSA.2012.6320454},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Croft12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GunduF12,
  author       = {Tapiwa Gundu and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {The enemy within: {A} behavioural intention model and an information
                  security awareness process},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320437},
  doi          = {10.1109/ISSA.2012.6320437},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/GunduF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HunterSIR12,
  author       = {Samuel O. Hunter and
                  Etienne Stalmans and
                  Barry Irwin and
                  John Richter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Remote fingerprinting and multisensor data fusion},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320449},
  doi          = {10.1109/ISSA.2012.6320449},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/HunterSIR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Irwin12,
  author       = {Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {A network telescope perspective of the Conficker outbreak},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320455},
  doi          = {10.1109/ISSA.2012.6320455},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Irwin12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Jordaan12,
  author       = {Jason Jordaan},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {A Sample of digital forensic quality assurance in the South African
                  criminal justice system},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320431},
  doi          = {10.1109/ISSA.2012.6320431},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Jordaan12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KarieV12,
  author       = {Nickson M. Karie and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Measuring semantic similarity between digital forensics terminologies
                  using web search engines},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320448},
  doi          = {10.1109/ISSA.2012.6320448},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/KarieV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KayemDH12,
  author       = {Anne V. D. M. Kayem and
                  Azhar Deshai and
                  Stuart Hammer},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {On anonymizing social network graphs},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320456},
  doi          = {10.1109/ISSA.2012.6320456},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/KayemDH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KroezeO12,
  author       = {Christien Kroeze and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Gamifying authentication},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320439},
  doi          = {10.1109/ISSA.2012.6320439},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/KroezeO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/LengHMM12,
  author       = {Xuefei Leng and
                  Gerhard P. Hancke and
                  Keith Mayes and
                  Konstantinos Markantonakis},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Tag Group Authentication Using Bit-Collisions},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320447},
  doi          = {10.1109/ISSA.2012.6320447},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/LengHMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NjengaN12,
  author       = {Kennedy Njenga and
                  Sifiso Ndlovu},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {On privacy calculus and underlying consumer concerns influencing mobile
                  banking subscriptions},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320453},
  doi          = {10.1109/ISSA.2012.6320453},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/NjengaN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NtlatywaBH12,
  author       = {Phumezo Ntlatywa and
                  Reinhardt A. Botha and
                  Bertram Haskins},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Claimed vs observed information disclosure on social networking sites},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320443},
  doi          = {10.1109/ISSA.2012.6320443},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/NtlatywaBH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OehriT12,
  author       = {Caroline Oehri and
                  Stephanie Teufel},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Social media security culture},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320436},
  doi          = {10.1109/ISSA.2012.6320436},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/OehriT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OkereNC12,
  author       = {Irene Okere and
                  Johan Van Niekerk and
                  Mariana Carroll},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Assessing information security culture: {A} critical analysis of current
                  approaches},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320442},
  doi          = {10.1109/ISSA.2012.6320442},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/OkereNC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/PieterseO12,
  author       = {Heloise Pieterse and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Android botnets on the rise: Trends and characteristics},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320432},
  doi          = {10.1109/ISSA.2012.6320432},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/PieterseO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/PooeL12,
  author       = {Antonio Pooe and
                  Les Labuschagne},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {A conceptual model for digital forensic readiness},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320452},
  doi          = {10.1109/ISSA.2012.6320452},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/PooeL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/PotgieterN12,
  author       = {Marius Potgieter and
                  Johan Van Niekerk},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {The use of computer vision technologies to augment human monitoring
                  of secure computing facilities},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320450},
  doi          = {10.1109/ISSA.2012.6320450},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/PotgieterN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/RamaFB12,
  author       = {Sobhana Rama and
                  Stephen Flowerday and
                  Duane Boucher},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Information confidentiality and the Chinese Wall Model in Government
                  tender fraud},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320438},
  doi          = {10.1109/ISSA.2012.6320438},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/RamaFB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Savola12,
  author       = {Reijo M. Savola},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Strategies for security measurement objective decomposition},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320434},
  doi          = {10.1109/ISSA.2012.6320434},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Savola12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SeegerW12,
  author       = {Mark M. Seeger and
                  Stephen D. Wolthusen},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {A model for partially asynchronous observation of malicious behavior},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320435},
  doi          = {10.1109/ISSA.2012.6320435},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SeegerW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SibiyaVNF12,
  author       = {George Sibiya and
                  Hein S. Venter and
                  Sipho Ngobeni and
                  Thomas Fogwill},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Guidelines for procedures of a harmonised digital forensic process
                  in network forensics},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320451},
  doi          = {10.1109/ISSA.2012.6320451},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SibiyaVNF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/StalmansHI12,
  author       = {Etienne Stalmans and
                  Samuel O. Hunter and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Geo-spatial autocorrelation as a metric for the detection of Fast-Flux
                  botnet domains},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320433},
  doi          = {10.1109/ISSA.2012.6320433},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/StalmansHI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ToitK12,
  author       = {Tiny du Toit and
                  Hennie A. Kruger},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Filtering spam e-mail with Generalized Additive Neural Networks},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320446},
  doi          = {10.1109/ISSA.2012.6320446},
  timestamp    = {Tue, 11 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/ToitK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ValjarevicV12,
  author       = {Aleksandar Valjarevic and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Harmonised digital forensic investigation process model},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320441},
  doi          = {10.1109/ISSA.2012.6320441},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ValjarevicV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/VenterLC12,
  author       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Introduction},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320426},
  doi          = {10.1109/ISSA.2012.6320426},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/VenterLC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2012,
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6305018/proceeding},
  isbn         = {978-1-4673-2160-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/AllamF11,
  author       = {Sean Allam and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {An adaptation of the awareness boundary model towards smartphone security},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/36\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/AllamF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BangerterKSU11,
  author       = {Endre Bangerter and
                  Stephan Krenn and
                  Matrial Seifriz and
                  Ulrich Ultes{-}Nitsche},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {cPLC - {A} Cryptographic Programming Language and Compiler},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/50\_paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BangerterKSU11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BeyersOH11,
  author       = {Hector Beyers and
                  Martin S. Olivier and
                  Gerhard P. Hancke},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {An approach to examine the Metadata and Data of a database Management
                  System by making use of a forensic comparison tool},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Beyers\_Olivier\_Hancke.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BeyersOH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BorgBL11,
  author       = {Anton Borg and
                  Martin Boldt and
                  Niklas Lavesson},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Informed Software Installation Through License Agreement Categorization},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/91\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BorgBL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BoucherF11,
  author       = {Duane Boucher and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Privacy: In pursuit of Information security awareness},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Baucher\_Flowerday.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BoucherF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BurkeO11,
  author       = {Ivan Daniel Burke and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Analysing the fairness of trust-based Mobile Ad Hoc Network protocols},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/37\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BurkeO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/CarrollKM11,
  author       = {Mariana Carroll and
                  Paula Kotz{\'{e}} and
                  Alta van der Merwe},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Secure Cloud Computing: Benefits, Risks and Controls},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/13\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/CarrollKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Chan11,
  author       = {Ka Fai Peter Chan},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Secret sharing in audio steganography},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Chan.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Chan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/CoertzeNS11,
  author       = {Jacques Coertze and
                  Johan Van Niekerk and
                  Rossouw von Solms},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A web-based information security governance toolbox for small-to-medium
                  enterprises in Southern Africa},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/04\_Paper.pdf},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/CoertzeNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/CorregedorS11,
  author       = {Manuel Corregedor and
                  Sebastiaan H. von Solms},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Implementing Rootkits to Address Operating System Vulnerabilities},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/18\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/CorregedorS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/DelportKO11,
  author       = {Waldo Delport and
                  Michael K{\"{o}}hn and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Isolating a cloud instance for a digital forensic investigation},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Delport\_Olivier\_Kohn.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/DelportKO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Egan11,
  author       = {Shaun Egan},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {An Evaluation of Lightweight Classification Methods for Identifying
                  Malicious URLs},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/49\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Egan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/FoucheT11,
  author       = {Nico Pieter Fouche and
                  Kerry{-}Lynn Thomson},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Exploring the Human Dimension of {TETRA}},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/39\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/FoucheT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GalpinF11,
  author       = {Ryan Galpin and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Online Social Networks: Enhancing user trust through effective controls
                  and identity management},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/16\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GalpinF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GossB11,
  author       = {Ryan Gavin Goss and
                  Reinhardt A. Botha},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Traffic Management in Next Generation Service Provider Networks -
                  Are We There Yet?},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/38\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GossB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GroblerDNL11,
  author       = {Marthie Grobler and
                  Zama Dlamini and
                  Sipho Ngobeni and
                  Aubrey Labuschagne},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Towards a Cyber security aware rural community},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Grobler.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GroblerDNL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HunterI11,
  author       = {Samuel O. Hunter and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Tartarus: {A} honeypot based malware tracking and mitigation framework},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Hunter.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/HunterI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/IsherwoodC11,
  author       = {Donovan Isherwood and
                  Marijke Coetzee},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Enhancing Digital Business Ecosystem Trust and Reputation with Centrality
                  Measures},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/57\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/IsherwoodC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KarokolaKY11,
  author       = {Geoffrey Karokola and
                  Stewart Kowalski and
                  Louise Yngstr{\"{o}}m},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Secure e-Government Services: Towards {A} Framework for Integrating
                  {IT} Security Services into e-Government Maturity Models},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/31\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KarokolaKY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KayemMA11,
  author       = {Anne V. D. M. Kayem and
                  Patrick Martin and
                  Selim G. Akl},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Efficient Enforcement of Dynamic Access Control Policies for Outsourced
                  Data},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/07\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KayemMA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KhanyileTD11,
  author       = {Nontokozo P. Khanyile and
                  Jules{-}Raymond Tapamo and
                  Erick Dube},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A Comparative Study of Fingerprint Thinning algorithms},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Khanyile\_Tapamo\_Dube.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KhanyileTD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KoletkaH11,
  author       = {Robert Koletka and
                  Andrew Hutchison},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {An Architecture for Secure Searchable Cloud Storage},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/33\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KoletkaH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KrugerFDS11,
  author       = {Hennie A. Kruger and
                  Stephen Flowerday and
                  Lynette Drevin and
                  Tjaart Steyn},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {An assessment of the role of cultural factors in information security
                  awareness},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/93\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KrugerFDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/LabuschagneVB11,
  author       = {Aubrey Labuschagne and
                  Namosha Veerasamy and
                  Ivan Burke},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Design of cyber security awareness game utilizing a social media framework},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/79\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/LabuschagneVB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MabutoV11,
  author       = {Enos K. Mabuto and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {State of the Art of Digital Forensic Techniques},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Mabuto\_Venter.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MabutoV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OcholaE11,
  author       = {Elisha O. Ochola and
                  Mariki M. Eloff},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A Review of Black Hole attack on {AODV} Routing in {MANET}},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Ochola\_Eloff.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/OcholaE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/RakitianskaiaOC11,
  author       = {Anastassia S. Rakitianskaia and
                  Martin S. Olivier and
                  Antony K. Cooper},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Nature and Forensic investigation of crime in Second Life},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Rakitianskaia\_Olivier\_Cooper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/RakitianskaiaOC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ReidNS11,
  author       = {Rayne Reid and
                  Johan Van Niekerk and
                  Rossouw von Solms},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Guidelines for the creation of brain compatible cyber security educational
                  material in Moodle 2.0},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/06\_Paper.pdf},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/ReidNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SavolaH11,
  author       = {Reijo Savola and
                  Petri Heinonen},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A Visualization and Modeling Tool for Security Metrics and Measurements
                  Management},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/09\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/SavolaH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SerraV11,
  author       = {Stephen Serra and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Mobile cyber-bullying: {A} proposal for a pre-emptive approach to
                  risk mitigation by employing digital forensic readiness},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/99\_paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/SerraV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ShahzadN11,
  author       = {Raja Khurram Shahzad and
                  Niklas Lavesson},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Detecting Scareware by Mining Variable Length Instruction Sequences},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/28\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ShahzadN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SolmsTM11,
  author       = {Rossouw von Solms and
                  Kerry{-}Lynn Thomson and
                  Mvikeli Maninjwa},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Information Security Governance control through comprehensive policy
                  architectures},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/26\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/SolmsTM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/StadenV11,
  author       = {Franscois Van Staden and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Adding digital forensic readiness to electronic communication using
                  a security monitoring tool},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/70\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/StadenV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Stalmans11,
  author       = {Etienne Stalmans},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A Framework for {DNS} based detection and mitigation of malware infections
                  on a network},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/44\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Stalmans11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/StraussO11,
  author       = {Tinus Strauss and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Network Forensics in a Clean-Slate Internet Architecture},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/94\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/StraussO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/TarwireyiFB11,
  author       = {Paul Tarwireyi and
                  Stephen Flowerday and
                  Anass Bayaga},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Information Security Competence Test with Regards to Password Management},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/29\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/TarwireyiFB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ValjarevicV11,
  author       = {Aleksandar Valjarevic and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Towards a Digital Forensics Readiness Framework for Public Key Infrastructure
                  Systems},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/66\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ValjarevicV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/VeerasamyE11,
  author       = {Namosha Veerasamy and
                  Jan H. P. Eloff},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {{UML} Modelling Of Network Warfare Examples},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Veerasamy.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/VeerasamyE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/WinkelvosRR11,
  author       = {Timo Winkelvos and
                  Carsten Rudolph and
                  J{\"{u}}rgen Repp},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A Property Based Security Risk Analysis Through Weighted Simulation},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/55\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/WinkelvosRR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2011,
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  isbn         = {978-1-4577-1482-5},
  timestamp    = {Wed, 08 Feb 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Al-SalloumW10,
  author       = {Ziyad S. Al{-}Salloum and
                  Stephen D. Wolthusen},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Agent-Based Host Enumeration and Vulnerability Scanning Using Dynamic
                  Topology Information},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/13\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Al-SalloumW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/AnuarPFC10,
  author       = {Nor Badrul Anuar and
                  Maria Papadaki and
                  Steven Furnell and
                  Nathan L. Clarke},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {An investigation and survey of response options for Intrusion Response
                  Systems (IRSs)},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/69\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/AnuarPFC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BarskeSJ10,
  author       = {David Barske and
                  Adrie Stander and
                  Jason Jordaan},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A Digital Forensic Readiness Framework for South African SME's},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/30\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BarskeSJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BayagaF10,
  author       = {Anass Bayaga and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A Conceptual Operational Risk Model for SMEs: Impact on Organisational
                  Information Technology},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/09\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BayagaF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BezuidenhoutMV10,
  author       = {Monique Bezuidenhout and
                  Francois Mouton and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Social Engineering Attack Detection Model: {SEADM}},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/80\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BezuidenhoutMV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ChettyC10,
  author       = {Jacqui Chetty and
                  Marijke Coetzee},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Towards an Information Security Framework for Service-Oriented Architecture},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/35\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ChettyC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/CravenE10,
  author       = {Alain Craven and
                  Mariki M. Eloff},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Biometrics as an Agent to Reduce Fraud in the Micro Lending Industry
                  in South Africa},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/08\_paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/CravenE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/DlaminiVES10,
  author       = {Moses Dlamini and
                  Elmarie Venter and
                  Jan H. P. Eloff and
                  Danie Smit},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Inclusive Information Society - Challenges from a South African Rural
                  Primary Healthcare Perspective},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/24\_paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/DlaminiVES10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/FairuzR10,
  author       = {Mohamed Al Fairuz and
                  Karen Renaud},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Multi-channel, Multi-level Authentication for More Secure eBanking},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/10\_paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/FairuzR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GangadharanP10,
  author       = {Valiya Gangadharan and
                  Laurette Pretorius},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Towards an Ethical Analysis of the {W3C} Web Services Architecture
                  Model},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/81\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GangadharanP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GossB10,
  author       = {Ryan G. Goss and
                  Reinhardt A. Botha},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Deep Packet Inspection - Fear of the Unknown},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/34\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GossB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Grobler10,
  author       = {Marthie Grobler},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Phishing for Fortune},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/01\_paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Grobler10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GroblerB10,
  author       = {Marthie Grobler and
                  Harri Bryk},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Common problems faced during the establishment of a {CSIRT}},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/17\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GroblerB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GroblerL10,
  author       = {Cornelia Grobler and
                  Buks Louwrens},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A Digital Evidence Management Plan},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/53\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GroblerL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GroblerV10,
  author       = {Marthie Grobler and
                  Joey Jansen van Vuuren},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Broadband broadens scope for cyber crime in Africa},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/28\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GroblerV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Kayem10,
  author       = {Anne Kayem},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {On Monitoring Information Flow of Outsourced Data},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/82\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Kayem10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Kyobe10,
  author       = {Michael Kyobe},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Towards a framework to guide compliance with {IS} Security policies
                  and Regulations in a university},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/56\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Kyobe10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/LallaF10,
  author       = {Himal Lalla and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Towards a Standardised Digital Forensic Process: E-mail Forensics},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/05\_paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/LallaF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/LavarackC10,
  author       = {Tristan Lavarack and
                  Marijke Coetzee},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Considering web services security policy compatibility},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/40\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/LavarackC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MegawF10,
  author       = {Greg Megaw and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Phishing within E-Commerce: {A} Trust and Confidence Game},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/07\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MegawF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NiekerkM10,
  author       = {Brett van Niekerk and
                  Manoj S. Maharaj},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Mobile Security from an Information Warfare Perspective},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/06\_Paper.pdf},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/NiekerkM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/RamgovindES10,
  author       = {Sumant Ramgovind and
                  Mariki M. Eloff and
                  Elme Smith},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {The Management of Cloud Computing Security},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/27\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/RamgovindES10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/RenaudG10,
  author       = {Karen Renaud and
                  Dora Galvez{-}Cruz},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Privacy: Aspects, Definitions and a Multi-Faceted Privacy Preservation
                  Approach},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/25\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/RenaudG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SavolaPO10,
  author       = {Reijo Savola and
                  Heimo Pentik{\"{a}}inen and
                  Moussa Ouedraogo},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Towards Security Effectiveness Measurement utilizing Risk-Based Security
                  Assurance},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/11\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/SavolaPO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SeegerWBB10,
  author       = {Mark M. Seeger and
                  Stephen D. Wolthusen and
                  Christoph Busch and
                  Harald Baier},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {The Cost of Observation for Intrusion Detection: Performance Impact
                  of Concurrent Host Observation},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/14\_Paper.pdf},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/SeegerWBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SmithK10,
  author       = {Eugene Smith and
                  Hennie A. Kruger},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A framework for evaluating {IT} security investments in a banking
                  environment},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/04\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/SmithK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SpycherH10,
  author       = {Oliver Spycher and
                  Rolf Haenni},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A Novel Protocol to Allow Revocation of Votes in a Hybrid Voting System},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/44\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/SpycherH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Ssekibuule10,
  author       = {Richard Ssekibuule},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Secure Publish-Subscribe Mediated Virtual Organizations},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/18\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Ssekibuule10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/StadenV10,
  author       = {Francois Ruan Van Staden and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Adding digital forensic readiness to the email trace header},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/45\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/StadenV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/TripathiMR10,
  author       = {Alok Tripathi and
                  Abhinav Mishra and
                  G. V. Raghunathan},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A Test Bed for Information Security Skill Development with Virtual
                  Training Environment},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/03\_paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/TripathiMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Veerasamy10,
  author       = {Namosha Veerasamy},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Motivation for Cyberterrorrism},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/02\_paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Veerasamy10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/VisageO10,
  author       = {Hendrik Visage and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A Generalized model for understanding and education of Information
                  and Computer Security},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/41\_paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/VisageO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2010,
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  isbn         = {978-1-4244-5494-5},
  timestamp    = {Mon, 11 Jun 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/AdimoM09,
  author       = {Anna B. Adimo and
                  Fisseha Mekuria},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Mobile Communications Security Research at {CSIR-MDS}},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {489--490},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/ISSA2009FMekuria.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/AdimoM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BarnettI09,
  author       = {Richard J. Barnett and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {A Framework for the Rapid Development of Anomaly Detection Algorithms
                  in Network Intrusion Detection Systems},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {269--278},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/26\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BarnettI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BoshoffN09,
  author       = {Ryno Boshoff and
                  Johan Van Niekerk},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {E-mail Security awareness at Nelson Mandela Metropolitan University
                  (Registrar's Division)},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {279--292},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/23\_Paper.pdf},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/BoshoffN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ChettyC09,
  author       = {Jacqui Chetty and
                  Marijke Coetzee},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Evaluating Information Security Controls Applied by Service-Oriented
                  Architecture Governance Frameworks},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {227--242},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/7\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ChettyC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/CowieIB09,
  author       = {Bradley Cowie and
                  Barry Irwin and
                  Richard J. Barnett},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Management, Processing and Analysis of Cryptographic Network Protocols},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {479--488},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/20.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/CowieIB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/DagadaEV09,
  author       = {Rabelani Dagada and
                  Mariki M. Eloff and
                  Lucas M. Venter},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Too Many Laws But Very Little Progress! Is South African Highly Acclaimed
                  Information Security Legislation Redundant?},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {327--346},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/4\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/DagadaEV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/DlaminiEEH09,
  author       = {Moses Dlamini and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Karin H{\"{o}}ne},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {{BC3I} - Towards Requirements Specification for Preparing an Information
                  Security Budget},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {53--68},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/57\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/DlaminiEEH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/DlaminiO09,
  author       = {Innocentia Dlamini and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {The Design of a Logical Traffic Isolation Forensic Model},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {407--418},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/53\_ISSA-IZ\_Dlamini.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/DlaminiO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/FrauensteinS09,
  author       = {Edwin Donald Frauenstein and
                  Rossouw von Solms},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Phishing: How an Organization can Protect Itself},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {253--268},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/12\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/FrauensteinS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GodlstuckD09,
  author       = {Arthur Godlstuck and
                  Rabelani Dagada},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Help Us! We Want to be "E-Secured": Digital Banking Customers' Security
                  Needs in South Africa},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {117--136},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/55\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GodlstuckD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GroblerL09,
  author       = {Cornelia Grobler and
                  Buks Louwrens},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {High-Level Integrated Vie of Digital Forensics},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {15--34},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/28\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GroblerL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GroblerS09,
  author       = {Marthie Grobler and
                  Basie von Solms},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {A Best Practice Approach to Live Forensic Acquisition},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {3--13},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/1\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GroblerS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HjelmasSW09,
  author       = {Erik Hjelm{\aa}s and
                  Nils Kalstad Svendsen and
                  Stephen D. Wolthusen},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Integrating Information Security with Information System Architecture
                  and Administration Curricula},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {363--376},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/13\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/HjelmasSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KarokolaY09,
  author       = {Geoffrey Karokola and
                  Louise Yngstr{\"{o}}m},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Discussing E-Government Maturity Models for the Developing World -
                  Security View},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {81--98},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/30\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KarokolaY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/LatzeRU09,
  author       = {Carolin Latze and
                  Andreas Ruppen and
                  Ulrich Ultes{-}Nitsche},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {A Proof of Concept Implementation of a Secure E-Commerce Authentication
                  Scheme},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {379--392},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/15\_latze-ruppen-ultes-nitsche.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/LatzeRU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/LavarackC09,
  author       = {Tristan Lavarack and
                  Marijke Coetzee},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {A Framework for Web Services Security Policy Negotiation},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {153--170},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/36\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/LavarackC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Meer09,
  author       = {Haroon Meer},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {An examination of the Generic Exploit Prevention Mechanisms on Apple's
                  Leopard Operating System},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {137--152},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/38\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Meer09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MonkNS09,
  author       = {Thomas Monk and
                  Johan Van Niekerk and
                  Rossouw von Solms},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Concealing the Medicine: Information Security Education through Game
                  Play},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {467--478},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/10.pdf},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MonkNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MwakalingaKY09,
  author       = {Jeffy Mwakalinga and
                  Stewart Kowalski and
                  Louise Yngstr{\"{o}}m},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Methodology for Considering Environments and Culture in Developing
                  Information Security Systems},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {419--436},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/9\_SecEnvFinal.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MwakalingaKY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NgobeniG09,
  author       = {Sipho Josia Ngobeni and
                  Marthie Grobler},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Information Security Policies for Governmental Organisations, The
                  Minimum Criteria},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {455--466},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/50.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/NgobeniG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NgobeniV09,
  author       = {Sipho Josia Ngobeni and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {The Design of a Wireless Forensic Readiness Model(WFRM)},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {35--52},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/52\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/NgobeniV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NjengaB09,
  author       = {Kennedy Njenga and
                  Irwin Brown},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Inductively Deriving an Organisational Information Security Risk Management
                  Agenda by Exploring Process Improvisation},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {347--362},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/39\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/NjengaB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NottinghamI09,
  author       = {Alastair Nottingham and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Investigating the effect of Genetic Algorithms on Filter Optimisation
                  Within Fast Packet Classifiers},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {99--116},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/21\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/NottinghamI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/PranschkeIB09,
  author       = {George{-}Christian Pranschke and
                  Barry Irwin and
                  Richard J. Barnett},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Automated Firewall Rule Set Generation Through Passive Traffic Inspection},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {243--252},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/19\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/PranschkeIB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Savola09,
  author       = {Reijo Savola},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Identification of Basic Measurable Security Components in Software-Intensive
                  Systems},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {69--80},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/34\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Savola09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SchaeferWHP09,
  author       = {Christian Schaefer and
                  Thomas Walter and
                  Mat{\'{u}}s Harvan and
                  Alexander Pretschner},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Usage Control Policy Enforcement in OpenOffice.org and Information
                  Flow},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {393--406},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/9\_UsageControlPolicyEnforcement.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/SchaeferWHP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SmithC09,
  author       = {Gregory Stuart Smith and
                  Marijke Coetzee},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {An Analysis of Authentication for Passive {RFID} Tags},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {189--204},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/14\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/SmithC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/StadenV09,
  author       = {Franscois Van Staden and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {The State of the Art of Spam and Anti-Spam Strategies and a Possible
                  Solution using Digital Forensics},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {437--454},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/47.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/StadenV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/StanderDR09,
  author       = {Adrie Stander and
                  A. Dunnet and
                  J. Rizzo},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {A Survey of Computer Crime and Security in South Africa},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {217--226},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/56\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/StanderDR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/VeerasamyT09,
  author       = {Namosha Veerasamy and
                  Barend Taute},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {An Introduction to Emerging Threats and Vulnerabilities to Create
                  User Awareness},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {205--216},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/24\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/VeerasamyT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/VictorRB09,
  author       = {Rudi Victor and
                  Andrew Rutherford and
                  Reinhardt A. Botha},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Enhanced Presence Handling},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {309--326},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/29\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/VictorRB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/VuralV09,
  author       = {Ickin Vural and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Investigating Identity Concealing and Email Tracing Techniques},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {293--308},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/40\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/VuralV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ZielinskiO09,
  author       = {Marek P. Zielinski and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {How Appropriate is K-Anonymity for Addressing the Conflict Between
                  Privacy and Information Utility in Microdata ASnonymisation},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {171--188},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/46\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ZielinskiO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2009,
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  isbn         = {978-1-86854-740-1},
  timestamp    = {Wed, 08 Feb 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Amsenga08,
  author       = {Johann Amsenga},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {An Introduction to Standards related to Information Security},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--18},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/24.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Amsenga08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BiermannM08,
  author       = {Elmarie Biermann and
                  Jan Mentz},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {Emerging Framework for The Evaluation of Open Source Security Tools},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--15},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/69.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BiermannM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Dayarathna08,
  author       = {Rasika Dayarathna},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {The Principle of Security Safeguards: Accidental Activities},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--18},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/63.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Dayarathna08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/DeasF08,
  author       = {Matthew Deas and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {A User Centric Model for Online Identity and Access Management},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--21},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/13.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/DeasF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/EhretU08,
  author       = {Christoph Ehret and
                  Ulrich Ultes{-}Nitsche},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {Immune System Based Intrusion Detection System},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/50.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/EhretU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/FrangopoulosEV08,
  author       = {Evangelos D. Frangopoulos and
                  Mariki M. Eloff and
                  Lucas M. Venter},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {Social Aspects of Information Security},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--33},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/16.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/FrangopoulosEV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/IrwinF08,
  author       = {Barry Irwin and
                  Blake Friedman},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {Spam Construction Trends},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/49.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/IrwinF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KarokolaY08,
  author       = {Geoffrey Karokola and
                  Louise Yngstr{\"{o}}m},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {Lessons Learnt in the Process of Computerization, Automation and Management
                  of {ICT} Security in the Developing World: {A} Case Study of The University
                  of Dar Es Salaam, Tanzania},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--24},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/68.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KarokolaY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KhayariKS08,
  author       = {Rachid El Khayari and
                  Nicolai Kuntze and
                  Andreas U. Schmidt},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {Spam Over Internet Telephony and How to Deal with it},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--25},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/67.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KhayariKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KoenO08,
  author       = {Renico Koen and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {The Use of File Timestamps in Digital Forensics},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--16},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/43.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KoenO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KohnEO08,
  author       = {Michael K{\"{o}}hn and
                  Jan H. P. Eloff and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {{UML} Modelling of Digital Forensic Process Models (DFPMs)},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--13},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/25.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KohnEO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KrugerSDM08,
  author       = {Hennie A. Kruger and
                  Tjaart Steyn and
                  Lynette Drevin and
                  Dawn Medlin},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {Password Management: Empirical Results from a {RSA} and {USA} Study},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/32.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KrugerSDM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/LatzeU08,
  author       = {Carolin Latze and
                  Ulrich Ultes{-}Nitsche},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {A Proof-of-Concept Implementation of {EAP-TLS} with {TPM} Support},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/46.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/LatzeU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/LessingW08,
  author       = {Marthie Lessing and
                  Lara Weissenberger},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {No Age Discrimination for Biometrics},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--26},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/1.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/LessingW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Mahanamahewa08,
  author       = {Sri Warna Mahanamahewa},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {Computer Monitoring in the 21st Century Workplace},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--15},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/15.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Mahanamahewa08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MokhonoanaO08,
  author       = {Pontjho Mokhonoana and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {Application of Message Digests for the Verification of Logical Forensic
                  Data},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/42.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MokhonoanaO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NiekerkS08,
  author       = {Johan Van Niekerk and
                  Rossouw von Solms},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {Bloom's Taxonomy for Information Security Education},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--13},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/39.pdf},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/NiekerkS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NjengaB08,
  author       = {Kennedy Njenga and
                  Irwin Brown},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {Collective Improvisation: Complementing Information Security Frameworks
                  with Self-Policing},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--16},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/38.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/NjengaB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Pistorius08,
  author       = {Tana Pistorius},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {The {IP} Protection of Electronic Databases: Copyright or Copywrong?},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--18},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/66.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Pistorius08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Savola08,
  author       = {Reijo Savola},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {A Novel Security Metrics Taxonomy for R{\&}D Organisations},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/2.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Savola08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ShandT08,
  author       = {Leonard Shand and
                  Theodore Tryfonas},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {A Collaborative Distributed Virtual Platform for Forensic Analysis
                  of Malicious Code},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--18},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/45.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ShandT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/StephanouD08,
  author       = {Tony Stephanou and
                  Rabelani Dagada},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {The Impact of Information Security Awareness Training on Information
                  Security Behaviour: The Case for Further Research},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--21},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/54.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/StephanouD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/TvrzC08,
  author       = {Frankie Tvrz and
                  Marijke Coetzee},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {The Information Security of a Bluetooth-Enabled Handheld Device},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/3.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/TvrzC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/VeerasamyE08,
  author       = {Namosha Veerasamy and
                  Jan H. P. Eloff},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {Towards a Framework for a Network Warfare Capability},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--18},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/9.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/VeerasamyE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2008,
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  isbn         = {978-1-86854-693-0},
  timestamp    = {Tue, 17 Feb 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ArnabH06,
  author       = {Alapan Arnab and
                  Andrew Hutchison},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Ticket Based Identity System for {DRM}},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/19\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ArnabH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BakariMTY06,
  author       = {Jabiri Kuwe Bakari and
                  Christer Magnusson and
                  Charles N. Tarimo and
                  Louise Yngstr{\"{o}}m},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Outsourcing {ICT} Security to {MSSP:} Issues and Challenges for The
                  Developing World},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/29\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BakariMTY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BranaganDL06,
  author       = {Mark Branagan and
                  Robert Dawson and
                  Dennis Longley},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Security Risk Analysis for Complex Systems},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/35\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BranaganDL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BrandiO06,
  author       = {Wesley Brandi and
                  Martin S. Olivier},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {On bidder zones, cell phones and ballot stuffing},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/83\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BrandiO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BraunGUBB06,
  author       = {Torsten Braun and
                  Christoph Graf and
                  Ulrich Ultes{-}Nitsche and
                  Aurelius Baier and
                  Thomas Bernoulli},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Case Study of the Usage of an Authentication and Authorization Infrastructure
                  {(AAI)} in an E-Learning Project},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/27\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BraunGUBB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ClaytonIT06,
  author       = {Bradley Clayton and
                  Barry Irwin and
                  Alfredo Terzoli},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Integrating Secure {RTP} into the Open Source VoIP {PBX} Asterisk},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/66\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ClaytonIT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/CroftO06,
  author       = {Neil J. Croft and
                  Martin S. Olivier},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Sequenced Release of Privacy Accurate Call Data Record Information
                  in a {GSM} Forensic Investigation},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--14},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/96\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/CroftO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Etsebeth06,
  author       = {Verine Etsebeth},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Information Security Policies - The Legal Risk of Uninformed Personnel},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/104\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Etsebeth06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Innerhofer-OberperflerB06,
  author       = {Frank Innerhofer{-}Oberperfler and
                  Ruth Breu},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Using an Enterprise Architecture for {IT} Risk Management},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/115\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Innerhofer-OberperflerB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KohnOE06,
  author       = {Michael K{\"{o}}hn and
                  Martin S. Olivier and
                  Jan H. P. Eloff},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Framework for a Digital Forensic Investigation},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--7},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/101\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KohnOE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KrugerDS06,
  author       = {Hennie A. Kruger and
                  Lynette Drevin and
                  Tjaart Steyn},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A Framework for Evaluating {ICT} Security Awareness},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/17\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KrugerDS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KuntzeS06,
  author       = {Nicolai Kuntze and
                  Andreas U. Schmidt},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Trusted Computing in Mobile Action},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/9\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KuntzeS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/LoutsiosP06,
  author       = {Demetrios Loutsios and
                  Maree Pather},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A Brokered Approach to Interoperable Security in OGSA-Based Grid Systems},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/119\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/LoutsiosP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MaphakelaP06,
  author       = {Rabbie Maphakela and
                  Dalenca Pottas},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Towards Regulatory Compliance - {A} model for the South African Financial
                  Sector},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/73\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MaphakelaP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/McManusE06,
  author       = {Leonie McManus and
                  Jan H. P. Eloff},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Using {IT} Benchmarking Principles to Design an Information Security
                  Benchmark Model},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/100\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/McManusE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Merwe06,
  author       = {Thomas McDonald van der Merwe},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A Profile of The Distance Computing Student Softlifter},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--20},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/74\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Merwe06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MwakalingaY06,
  author       = {Jeffy Mwakalinga and
                  Louise Yngstr{\"{o}}m},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Framework for Securing Mobile Software Agents},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/107\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MwakalingaY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NiekerkL06,
  author       = {Liesl van Niekerk and
                  Les Labuschagne},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {The Peculium Model: Information Security Risk Management for the South
                  African {SMME}},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--14},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/12\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/NiekerkL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NiekerkS06,
  author       = {Johan Van Niekerk and
                  Rossouw von Solms},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Understanding Information Security Culture: {A} Conceptual Framework},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/21\_Paper.pdf},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/NiekerkS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NjengaB06,
  author       = {Kennedy Nduati Njenga and
                  Irwin Brown},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Conceptualising the Influence of Tacit Knowledge in Security Risk
                  Management Activities},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/92\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/NjengaB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OphoffPB06,
  author       = {Jacobus A. Ophoff and
                  Stephen Perelson and
                  Reinhardt A. Botha},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A Model for Secure Value-Added Service Subscriptions in Cellular Networks},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--9},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/60\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/OphoffPB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OrmistonE06,
  author       = {Kate Ormiston and
                  Mariki M. Eloff},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Denial-of-Service {\&} Distributed Denial-of-Service on The Internet},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--14},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/18\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/OrmistonE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OttenIS06,
  author       = {Fred Otten and
                  Barry Irwin and
                  Hannah Slay},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {The Need for Centralised, Cross Platform Information Aggregation},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/63\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/OttenIS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/PreezP06,
  author       = {Dirk Willie du Preez and
                  Vreda Pieterse},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Calculating Compliance Standards},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/32\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/PreezP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/RasheedEKKF06,
  author       = {Abdullah Haroon Rasheed and
                  Muhammad Essam and
                  Umair Khalid and
                  Shoab Ahmed Khan and
                  Sheikh Muhammad Farhan},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A Low Bit Architecture for a Very Compact Hardware Implementation
                  of the {AES} Algorithm},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--8},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/68\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/RasheedEKKF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/RielI06,
  author       = {Jean{-}Pierre van Riel and
                  Barry Irwin},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Identifying and Investigating Intrusive Scanning Patterns by Visualizing
                  Network Telescope Traffic in a 3-D Scatter-plot},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/50\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/RielI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Savola06,
  author       = {Reijo Savola},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Towards Security Evaluation based on Evidence Collection},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/10\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Savola06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SchmidtP06,
  author       = {Andreas U. Schmidt and
                  Jan Piechalski},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Authorised Translations of Electronic Documents},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--14},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/3\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/SchmidtP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/TarimoBYK06,
  author       = {Charles N. Tarimo and
                  Jabiri Kuwe Bakari and
                  Louise Yngstr{\"{o}}m and
                  Stewart Kowalski},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A Social-Technical View of {ICT} Security Issues, Trends, and Challenges:
                  Towards a Culture of {ICT} Security - The Case of Tanzania},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/25\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/TarimoBYK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/TyukalaPSH06,
  author       = {Mkhululi Tyukala and
                  Dalenca Pottas and
                  Rossouw von Solms and
                  Helen van de Haar},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {The Organisational Information Security Profile - {A} Tool to Assist
                  The Board},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--13},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/79\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/TyukalaPSH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Watney06,
  author       = {Murdoch Watney},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Justifiability of State Surveillance of the Internet as E-Security
                  Mechanism},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/117\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Watney06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/WhiteI06,
  author       = {Dominic White and
                  Barry Irwin},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Monthly Patch Release Schedules: Do the Benefits Outweigh the Risks?},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--18},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/61\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/WhiteI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ZugenmaierPL06,
  author       = {Alf Zugenmaier and
                  Anand R. Prasad and
                  Julien Laganier},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Performance Analysis of a Secure Seamless Handover Mechanism in All-IP
                  Networks},
  booktitle    = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  url          = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/65\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ZugenmaierPL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2006,
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference,
                  5-7 July 2006, Balalaika Hotel, Sandton, South Africa},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2006},
  isbn         = {1-86854-636-5},
  timestamp    = {Tue, 17 Feb 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ArnabH05,
  author       = {Alapan Arnab and
                  Andrew Hutchison},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Requirement Analysis of Enterprise {DRM} Systems},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--14},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/024\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ArnabH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Baloyi05,
  author       = {Norman Tinyiko Baloyi},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Analysis of the financial institutions' strategic e-business security
                  solutions: Technical and non-Technical},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/080\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Baloyi05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Blaauw05,
  author       = {Pieter Blaauw},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Fighting spam in a corporate environment using open-source solutions
                  - a case study},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/005\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Blaauw05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BornmanL05,
  author       = {Werner Bornman and
                  Les Labuschagne},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A Framework for Information Security Risk Management Communication},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/017\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BornmanL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Breytenbach05,
  author       = {Christoff Breytenbach},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Introduction to Assessing and Securing Web Services},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--14},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/058\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Breytenbach05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ChaulaYK05,
  author       = {Job Asheri Chaula and
                  Louise Yngstr{\"{o}}m and
                  Stewart Kowalski},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A Framework for Evaluation of Information Systems Security},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/062\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ChaulaYK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/CloranI05,
  author       = {Russell Cloran and
                  Barry Irwin},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Trust on the Web},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--9},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/025\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/CloranI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/CoetzeeE05,
  author       = {Marijke Coetzee and
                  Jan H. P. Eloff},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Metadata for trust in service-oriented architectures},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/032\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/CoetzeeE05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/CruzL05,
  author       = {Eduardo Da Cruz and
                  Les Labuschagne},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A new framework for bridging the gap between {IT} Service Management
                  and {IT} Governance from a security perspective},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/072\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/CruzL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/FrangopoulosVE05,
  author       = {Evangelos D. Frangopoulos and
                  Lucas M. Venter and
                  Mariki M. Eloff},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Secure Authentication combined with Anonymity: The end of an oxymoron?},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/060\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/FrangopoulosVE05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Ghioni05,
  author       = {Fabio Ghioni},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Invasion of the RFIDs: are we heading towards "Modern Times"?},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--5},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/074\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Ghioni05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Hershensohn05,
  author       = {Johann Hershensohn},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {{IT} Forensics: the collection of and presentation of digital evidence},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--14},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/076\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Hershensohn05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Irwin05,
  author       = {Barry Irwin},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Unlocking the armour : enabling intrusion detection and analysis of
                  encrypted traffic streams},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  timestamp    = {Wed, 18 Feb 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Irwin05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/IzadiniaEK05,
  author       = {Vafa D. Izadinia and
                  Jan H. P. Eloff and
                  Derrick G. Kourie},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Foiling an Attack - Defeating IPSec Tunnel Fingerprinting},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--14},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/088\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/IzadiniaEK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Jansen05,
  author       = {M. Jansen},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Access to copyrighted work: right or privelege?},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/002\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Jansen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KrugerK05,
  author       = {Hennie A. Kruger and
                  Wayne D. Kearney},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Measuring Information Security Awareness - {A} West Africa Gold Mining
                  Environment Case},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/018\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KrugerK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ListB05,
  author       = {William List and
                  David Brewer},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Measuring the effectivness of an internal control system},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--13},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/101\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ListB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/LongleyB05,
  author       = {Dennis Longley and
                  Mark Branagan},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Developing Threat Networks for Risk Analysis of Information Systems},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/022\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/LongleyB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/LoockE05,
  author       = {Marianne Loock and
                  Jan H. P. Eloff},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A new Access Control model based on the Chinese Wall Security Policy
                  Model},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Research/096\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/LoockE05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MarnewickL05,
  author       = {Carl Marnewick and
                  Les Labuschagne},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A security framework for an {ERP} system},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--15},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/009\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MarnewickL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MlangeniB05,
  author       = {S. A. Mlangeni and
                  E. Biermann},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {An assessment of Information Security Policies within the Polokwane
                  area: {A} case study},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--9},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/008\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MlangeniB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MorkelEO05,
  author       = {Tayana Morkel and
                  Jan H. P. Eloff and
                  Martin S. Olivier},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {An overview of image steganography},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/098\_Article.pdf},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MorkelEO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MulderS05,
  author       = {R. Mulder and
                  Rossouw von Solms},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {The Proliferation of Wireless Devices and its Role in Corporate Governance},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/048\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MulderS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MwakalingaY05,
  author       = {Jeffy Mwakalinga and
                  Louise Yngstr{\"{o}}m},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Sketch of a generic security framework based on the paradigms of systemic-holistic
                  approach and the immune system},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/037\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MwakalingaY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NiekerkS05,
  author       = {Johan Van Niekerk and
                  Rossouw von Solms},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A holistic framework for the fostering of an information security
                  sub-culture in organizations},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--13},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/041\_Article.pdf},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/NiekerkS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OkamuraYF05,
  author       = {Shingo Okamura and
                  Maki Yoshida and
                  Toru Fujiwara},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Coin-based Anonymous Fingerprinting Scheme with Automatic Identification
                  of Redistributors},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/047\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/OkamuraYF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OphoffB05,
  author       = {Jacobus A. Ophoff and
                  Reinhardt A. Botha},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Revisiting Reachability Management as a Multilateral Security Mechanism},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/011\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/OphoffB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Parkin05,
  author       = {Emile Parkin},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Cryptographic Key Management principles applied in South African Internet
                  Banking},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/059\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Parkin05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/PatherV05,
  author       = {Maree Pather and
                  L. M. Venter},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Securing {SOAP} Messages with a Global Message Handler and a Standardized
                  Envelope},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--13},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/065\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/PatherV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SchliengerTR05,
  author       = {Thomas Schlienger and
                  Stephanie Teufel and
                  Raphael Rues},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Information Security Culture - Status Quo in Switzerland},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  timestamp    = {Fri, 09 Nov 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/SchliengerTR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SchmidtKR05,
  author       = {Andreas U. Schmidt and
                  Nicolai Kuntze and
                  Thomas Rauch},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Security for Distributed Web-Services via Aspect-Oriented Programming},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/003\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/SchmidtKR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SlavieroKO05,
  author       = {Marco Slaviero and
                  Jaco Kroon and
                  Martin S. Olivier},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Attacking Signed Binaries},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/099\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/SlavieroKO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/TarimoYK05,
  author       = {Charles N. Tarimo and
                  Louise Yngstr{\"{o}}m and
                  Stewart Kowalski},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {An approach to enhance the security of {ICT} infrastructure through
                  legal, regulatory influences},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/043\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/TarimoYK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/TuyikezeP05,
  author       = {Tite Tuyikeze and
                  Dalenca Pottas},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Information Security Management and Regulatory Compliance in the South
                  African Health Sector},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/038\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/TuyikezeP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2005,
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  isbn         = {1-86854-625-X},
  timestamp    = {Wed, 18 Feb 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Andersson04,
  author       = {Christer Andersson},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Privacy Enhanced Wap Browsing With Mcrowds Anonymity Properties And
                  Performance Evaluation Of The Mcrowds System},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/046.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Andersson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Arthur04,
  author       = {K. K. Arthur},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {An Investigation Into Computer Forensic Tools},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/060.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Arthur04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Bornman04,
  author       = {W. G. Bornman},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A Framework For Aligning Information Security Risk Management Methods
                  With It Governance Recommendations},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--14},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/015.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Bornman04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Botha04,
  author       = {Martin Botha},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Utilizing Neural Networks For Effective Intrusion Detection},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--15},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/040.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Botha04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Brandi04,
  author       = {Wesley Brandi},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {On Privacy And The Web},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--8},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/079.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Brandi04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Breedt04,
  author       = {Morn{\'{e}} Breedt},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Using {A} Central Data Repository For Biometric Authentication In
                  Passport Systems},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/072.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Breedt04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Casmir04,
  author       = {Respickius Casmir},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Intrinsic Legal Issues In It Security},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/001.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Casmir04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Coetzee04,
  author       = {Marijke Coetzee},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A Logic-Based Access Control Approach For Web Services},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/020.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Coetzee04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Eeden04,
  author       = {Johannes J. van Eeden},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Security Considerations In {A} Global Message Service Handler Design},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/044.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Eeden04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Farhan04,
  author       = {Sheikh Muhammad Farhan},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {High Data Rate 8-Bit Crypto Processor},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/008.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Farhan04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Forte04,
  author       = {Dario Forte},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {The "Art" Of Log Correlation - Tools And Techniques For Correlating
                  Events And Log Files},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--15},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/006.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Forte04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Frangopoulos04,
  author       = {Evangelos D. Frangopoulos},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A Comparative Study Of Standards And Practices Related To Information
                  Security Management},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--15},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/033.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Frangopoulos04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Frangopoulos04a,
  author       = {Evangelos D. Frangopoulos},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Biometric Protection Of Smartcards Through Fingerprint Matching: {A}
                  Technological Overview And Possible Directions},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--13},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/011.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Frangopoulos04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Ghioni04,
  author       = {Fabio Ghioni},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Advanced Platform For Corporate Incident Detection And Management},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/014.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Ghioni04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Granova04,
  author       = {Anna Granova},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {South African Online Banking: Who Carries The Risk?},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/081.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Granova04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Grogler04,
  author       = {Telanie Grogler},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Assessing The Policy Dimension Of Information Security},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--18},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/051.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Grogler04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Hertenberger04,
  author       = {Manfred P. Hertenberger},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A Case For Information Ownership In Erp Systems},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/009.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Hertenberger04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Joe04,
  author       = {Say Joe},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Case Studies Of Japan, South Korea And China In Implementation Of
                  IPv6},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/027.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Joe04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Jones04,
  author       = {Mariette Jones},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Legality Of Monitoring E-Mail At The Workplace: {A} Legal Update},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/078.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Jones04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Li04,
  author       = {Yun (Lillian) Li},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Categorizing Vulnerabilities Using Data Clustering Techniques},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/063.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Li04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Mwakalinga04,
  author       = {Jeffy Mwakalinga},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Integrated Security System Based On Security Assertion Markup Language
                  Standard},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--9},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/070.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Mwakalinga04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Nackros04,
  author       = {Kjell N{\"{a}}ckros},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Applied Holistic Approach For Security Awareness And Training - Computer
                  Games As Means To Increase Users' Information And Communication Security
                  Awareness},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/047.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Nackros04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Niekerk04,
  author       = {Johan Van Niekerk},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Organisational Learning Models For Information Security Education},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/043.pdf},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Niekerk04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Nkundlaa04,
  author       = {S. Nkundlaa},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {The Protection Of Public Health Data - {A} Case Study},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/036.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Nkundlaa04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Pather04,
  author       = {Maree Pather},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Are Current B2b Security Standards Antithetical To Global Interoperability?},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/028.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Pather04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Perelson04,
  author       = {Stephen Perelson},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {An Investigation Into Access Control For Mobile Devices},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/035.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Perelson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Phyo04,
  author       = {Aung Htike Phyo},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A Framework For Monitoring Insider Misuse Of It Applications},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/021.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Phyo04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Ramdeyal04,
  author       = {Arvish Ramdeyal},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A General Methodology For The Development Of An Effective Information
                  Security Policy},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/074.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Ramdeyal04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Rutherford04,
  author       = {Andrew Rutherford},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Towards Hippocratic Log Files},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/019.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Rutherford04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Staden04,
  author       = {Wynand van Staden},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A Virtual Machine For Security In {A} Relational Database Management
                  System: Design Issues},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--13},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/056.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Staden04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Thomas04,
  author       = {Anitta Thomas},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Propagating Trust In The Web Services Framework},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/012.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Thomas04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Ultes-Nitsche04,
  author       = {Ulrich Ultes{-}Nitsche},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Run-Time Protocol Conformance Verification In Firewalls},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/080.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Ultes-Nitsche04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/White04,
  author       = {Dominic White},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {A Unified Architecture For Automatic Software Updates},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/024.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/White04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Zielinski04,
  author       = {Marek Zielinski},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Applying Similarities Between Immune Systems And Mobile Agent Systems
                  In Intrusion Detection},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/016.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Zielinski04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2004,
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  isbn         = {1-86854-522-9},
  timestamp    = {Wed, 18 Feb 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2002,
  title        = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2003},
  timestamp    = {Wed, 18 Feb 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Botha02,
  author       = {Jacques Botha},
  title        = {A cyclic approach to Business Continuity Planning},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A006.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Botha02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Brandi02,
  author       = {Wesley Brandi},
  title        = {On the Semantic Web and its Web of Trust},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A031.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Brandi02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ChudleyU02,
  author       = {Simon R. Chudley and
                  Ulrich Ultes{-}Nitsche},
  title        = {Configuring Firewalls - An XML-based Approach to Modelling and Implementing
                  Firewall Configurations},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A012.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ChudleyU02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Coetzee02,
  author       = {Marijke Coetzee},
  title        = {Secure Database Connectivity On The {WWW}},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A029.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Coetzee02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Dembskey02,
  author       = {Evan James Dembskey},
  title        = {Quantum Cryptography - Advances in computer science may radically
                  alter cryptography},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A017.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Dembskey02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Engelbrecht02,
  author       = {Willem Engelbrecht},
  title        = {Access control and separation of duty in agent-based workflow environments},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A020.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Engelbrecht02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Gerber02,
  author       = {Petrunel Gerber},
  title        = {Information Security Health Check},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A009.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Gerber02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Holz02,
  author       = {Thomas Holz},
  title        = {An Efficient Intrusion Detection System Design},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A014.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Holz02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Hone02,
  author       = {Karin H{\"{o}}ne},
  title        = {Information Security Policy - What do International Information Security
                  Standards say?},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A027.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Hone02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Hoppe02,
  author       = {Oliver Andre Hoppe},
  title        = {Security architecture of the Microsoft .NET framework},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A028.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Hoppe02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Ingram02,
  author       = {Lance A. K. Ingram},
  title        = {Towards a pattern-based approach for achieving semantic integrity
                  in object-relational databases},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--9},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A019.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Ingram02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Kotze02,
  author       = {Paula Kotz{\'{e}}},
  title        = {Feedback And Task Analysis For E-Commerce Sites},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--17},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A038.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Kotze02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Loock02,
  author       = {Marianne Loock},
  title        = {Minimizing Security Risk Areas revealed by Data mining},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--15},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A030.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Loock02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Martins02,
  author       = {Ad{\'{e}}le Martins},
  title        = {Assessing Information Security Culture},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--14},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A026.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Martins02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Munro02,
  author       = {Kim Munro},
  title        = {Steganography - is it becoming a double-edged sword in computer security?},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--17},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A013.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Munro02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Niekerk02,
  author       = {Johan Van Niekerk},
  title        = {A Web-Based Portal For Information Security Education},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A034.pdf},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Niekerk02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Plessis02,
  author       = {Lindie du Plessis},
  title        = {Information Security Awareness: Baseline Education and Certification},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A008.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Plessis02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Robbertze02,
  author       = {Lizette Robbertze},
  title        = {Information Security Implementation Methodologies},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--19},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A032.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Robbertze02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/RollasonAM02,
  author       = {John Rollason and
                  Tom Addison and
                  Kim Munro},
  title        = {{IS} Security: User Identification and Authentication - The First
                  Pillar of {IS} Security},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--15},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A022.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/RollasonAM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Searle02,
  author       = {Francois Searle},
  title        = {An Analysis of Anonymity on the Internet},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--13},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A005.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Searle02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Taylor02,
  author       = {Simon Taylor},
  title        = {Practical Unix Security - Securing IBM's {AIX}},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--13},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A001.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Taylor02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Thomson02,
  author       = {Kerry{-}Lynn Thomson},
  title        = {Corporate Governance: Information security the weakest link?},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A007.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Thomson02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Ultes-NitscheY02,
  author       = {Ulrich Ultes{-}Nitsche and
                  InSeon Yoo},
  title        = {An Integrated Network Security Approach - Pairing Detecting Malicious
                  Patterns with Anomaly Detection},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A011.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Ultes-NitscheY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Venter02,
  author       = {Hein S. Venter},
  title        = {Comparing Intrusion Detection Tools using Generic Vulnerability Categories},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--18},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A025.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Venter02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Venter02a,
  author       = {Karin Venter},
  title        = {The Delegation Authorization Model: {A} Model For The Dynamic Delegation
                  Of Authorization Rights In {A} Secure Workflow Management System},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--13},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A021.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Venter02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Villiers02,
  author       = {Peter Jonathan de Villiers},
  title        = {Towards a Content-based Billing Model: The Synergy between Access
                  Control and Billing},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--10},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A018.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Villiers02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Vroom02,
  author       = {Cheryl Vroom},
  title        = {Auditing the Employee in the Work Environment with Regard to Information
                  Security},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  pages        = {1--11},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A010.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Vroom02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Zuccato02,
  author       = {Albin Zuccato},
  title        = {A modified mean value approach to assess security risk},
  booktitle    = {Proceedings of the {ISSA} 2002 Information for Security for South-Africa
                  2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel,
                  Muldersdrift, Gauteng, South Africa},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2002},
  url          = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A024.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Zuccato02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}