Search dblp for Publications

export results for "toc:db/conf/issa/issa2011.bht:"

 download as .bib file

@inproceedings{DBLP:conf/issa/AllamF11,
  author       = {Sean Allam and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {An adaptation of the awareness boundary model towards smartphone security},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/36\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/AllamF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BangerterKSU11,
  author       = {Endre Bangerter and
                  Stephan Krenn and
                  Matrial Seifriz and
                  Ulrich Ultes{-}Nitsche},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {cPLC - {A} Cryptographic Programming Language and Compiler},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/50\_paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BangerterKSU11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BeyersOH11,
  author       = {Hector Beyers and
                  Martin S. Olivier and
                  Gerhard P. Hancke},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {An approach to examine the Metadata and Data of a database Management
                  System by making use of a forensic comparison tool},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Beyers\_Olivier\_Hancke.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BeyersOH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BorgBL11,
  author       = {Anton Borg and
                  Martin Boldt and
                  Niklas Lavesson},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Informed Software Installation Through License Agreement Categorization},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/91\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BorgBL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BoucherF11,
  author       = {Duane Boucher and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Privacy: In pursuit of Information security awareness},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Baucher\_Flowerday.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BoucherF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BurkeO11,
  author       = {Ivan Daniel Burke and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Analysing the fairness of trust-based Mobile Ad Hoc Network protocols},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/37\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BurkeO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/CarrollKM11,
  author       = {Mariana Carroll and
                  Paula Kotz{\'{e}} and
                  Alta van der Merwe},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Secure Cloud Computing: Benefits, Risks and Controls},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/13\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/CarrollKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Chan11,
  author       = {Ka Fai Peter Chan},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Secret sharing in audio steganography},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Chan.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Chan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/CoertzeNS11,
  author       = {Jacques Coertze and
                  Johan Van Niekerk and
                  Rossouw von Solms},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A web-based information security governance toolbox for small-to-medium
                  enterprises in Southern Africa},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/04\_Paper.pdf},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/CoertzeNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/CorregedorS11,
  author       = {Manuel Corregedor and
                  Sebastiaan H. von Solms},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Implementing Rootkits to Address Operating System Vulnerabilities},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/18\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/CorregedorS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/DelportKO11,
  author       = {Waldo Delport and
                  Michael K{\"{o}}hn and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Isolating a cloud instance for a digital forensic investigation},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Delport\_Olivier\_Kohn.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/DelportKO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Egan11,
  author       = {Shaun Egan},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {An Evaluation of Lightweight Classification Methods for Identifying
                  Malicious URLs},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/49\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Egan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/FoucheT11,
  author       = {Nico Pieter Fouche and
                  Kerry{-}Lynn Thomson},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Exploring the Human Dimension of {TETRA}},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/39\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/FoucheT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GalpinF11,
  author       = {Ryan Galpin and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Online Social Networks: Enhancing user trust through effective controls
                  and identity management},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/16\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GalpinF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GossB11,
  author       = {Ryan Gavin Goss and
                  Reinhardt A. Botha},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Traffic Management in Next Generation Service Provider Networks -
                  Are We There Yet?},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/38\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GossB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GroblerDNL11,
  author       = {Marthie Grobler and
                  Zama Dlamini and
                  Sipho Ngobeni and
                  Aubrey Labuschagne},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Towards a Cyber security aware rural community},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Grobler.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GroblerDNL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HunterI11,
  author       = {Samuel O. Hunter and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Tartarus: {A} honeypot based malware tracking and mitigation framework},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Hunter.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/HunterI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/IsherwoodC11,
  author       = {Donovan Isherwood and
                  Marijke Coetzee},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Enhancing Digital Business Ecosystem Trust and Reputation with Centrality
                  Measures},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/57\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/IsherwoodC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KarokolaKY11,
  author       = {Geoffrey Karokola and
                  Stewart Kowalski and
                  Louise Yngstr{\"{o}}m},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Secure e-Government Services: Towards {A} Framework for Integrating
                  {IT} Security Services into e-Government Maturity Models},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/31\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KarokolaKY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KayemMA11,
  author       = {Anne V. D. M. Kayem and
                  Patrick Martin and
                  Selim G. Akl},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Efficient Enforcement of Dynamic Access Control Policies for Outsourced
                  Data},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/07\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KayemMA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KhanyileTD11,
  author       = {Nontokozo P. Khanyile and
                  Jules{-}Raymond Tapamo and
                  Erick Dube},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A Comparative Study of Fingerprint Thinning algorithms},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Khanyile\_Tapamo\_Dube.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KhanyileTD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KoletkaH11,
  author       = {Robert Koletka and
                  Andrew Hutchison},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {An Architecture for Secure Searchable Cloud Storage},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/33\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KoletkaH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KrugerFDS11,
  author       = {Hennie A. Kruger and
                  Stephen Flowerday and
                  Lynette Drevin and
                  Tjaart Steyn},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {An assessment of the role of cultural factors in information security
                  awareness},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/93\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KrugerFDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/LabuschagneVB11,
  author       = {Aubrey Labuschagne and
                  Namosha Veerasamy and
                  Ivan Burke},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Design of cyber security awareness game utilizing a social media framework},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/79\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/LabuschagneVB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MabutoV11,
  author       = {Enos K. Mabuto and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {State of the Art of Digital Forensic Techniques},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Mabuto\_Venter.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MabutoV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OcholaE11,
  author       = {Elisha O. Ochola and
                  Mariki M. Eloff},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A Review of Black Hole attack on {AODV} Routing in {MANET}},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Ochola\_Eloff.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/OcholaE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/RakitianskaiaOC11,
  author       = {Anastassia S. Rakitianskaia and
                  Martin S. Olivier and
                  Antony K. Cooper},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Nature and Forensic investigation of crime in Second Life},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Rakitianskaia\_Olivier\_Cooper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/RakitianskaiaOC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ReidNS11,
  author       = {Rayne Reid and
                  Johan Van Niekerk and
                  Rossouw von Solms},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Guidelines for the creation of brain compatible cyber security educational
                  material in Moodle 2.0},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/06\_Paper.pdf},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/ReidNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SavolaH11,
  author       = {Reijo Savola and
                  Petri Heinonen},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A Visualization and Modeling Tool for Security Metrics and Measurements
                  Management},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/09\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/SavolaH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SerraV11,
  author       = {Stephen Serra and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Mobile cyber-bullying: {A} proposal for a pre-emptive approach to
                  risk mitigation by employing digital forensic readiness},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/99\_paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/SerraV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ShahzadN11,
  author       = {Raja Khurram Shahzad and
                  Niklas Lavesson},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Detecting Scareware by Mining Variable Length Instruction Sequences},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/28\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ShahzadN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SolmsTM11,
  author       = {Rossouw von Solms and
                  Kerry{-}Lynn Thomson and
                  Mvikeli Maninjwa},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Information Security Governance control through comprehensive policy
                  architectures},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/26\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/SolmsTM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/StadenV11,
  author       = {Franscois Van Staden and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Adding digital forensic readiness to electronic communication using
                  a security monitoring tool},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/70\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/StadenV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Stalmans11,
  author       = {Etienne Stalmans},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A Framework for {DNS} based detection and mitigation of malware infections
                  on a network},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/44\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Stalmans11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/StraussO11,
  author       = {Tinus Strauss and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Network Forensics in a Clean-Slate Internet Architecture},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/94\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/StraussO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/TarwireyiFB11,
  author       = {Paul Tarwireyi and
                  Stephen Flowerday and
                  Anass Bayaga},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Information Security Competence Test with Regards to Password Management},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/29\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/TarwireyiFB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ValjarevicV11,
  author       = {Aleksandar Valjarevic and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Towards a Digital Forensics Readiness Framework for Public Key Infrastructure
                  Systems},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/66\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ValjarevicV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/VeerasamyE11,
  author       = {Namosha Veerasamy and
                  Jan H. P. Eloff},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {{UML} Modelling Of Network Warfare Examples},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Veerasamy.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/VeerasamyE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/WinkelvosRR11,
  author       = {Timo Winkelvos and
                  Carsten Rudolph and
                  J{\"{u}}rgen Repp},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A Property Based Security Risk Analysis Through Weighted Simulation},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/55\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/WinkelvosRR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2011,
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  isbn         = {978-1-4577-1482-5},
  timestamp    = {Wed, 08 Feb 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}