default search action
Search dblp for Publications
export results for "toc:db/conf/issa/issa2011.bht:"
@inproceedings{DBLP:conf/issa/AllamF11, author = {Sean Allam and Stephen Flowerday}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {An adaptation of the awareness boundary model towards smartphone security}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/36\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/AllamF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BangerterKSU11, author = {Endre Bangerter and Stephan Krenn and Matrial Seifriz and Ulrich Ultes{-}Nitsche}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {cPLC - {A} Cryptographic Programming Language and Compiler}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/50\_paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BangerterKSU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BeyersOH11, author = {Hector Beyers and Martin S. Olivier and Gerhard P. Hancke}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {An approach to examine the Metadata and Data of a database Management System by making use of a forensic comparison tool}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Beyers\_Olivier\_Hancke.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BeyersOH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BorgBL11, author = {Anton Borg and Martin Boldt and Niklas Lavesson}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Informed Software Installation Through License Agreement Categorization}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/91\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BorgBL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BoucherF11, author = {Duane Boucher and Stephen Flowerday}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Privacy: In pursuit of Information security awareness}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Baucher\_Flowerday.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BoucherF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BurkeO11, author = {Ivan Daniel Burke and Martin S. Olivier}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Analysing the fairness of trust-based Mobile Ad Hoc Network protocols}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/37\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BurkeO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/CarrollKM11, author = {Mariana Carroll and Paula Kotz{\'{e}} and Alta van der Merwe}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Secure Cloud Computing: Benefits, Risks and Controls}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/13\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/CarrollKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Chan11, author = {Ka Fai Peter Chan}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Secret sharing in audio steganography}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Chan.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Chan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/CoertzeNS11, author = {Jacques Coertze and Johan Van Niekerk and Rossouw von Solms}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A web-based information security governance toolbox for small-to-medium enterprises in Southern Africa}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/04\_Paper.pdf}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/CoertzeNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/CorregedorS11, author = {Manuel Corregedor and Sebastiaan H. von Solms}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Implementing Rootkits to Address Operating System Vulnerabilities}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/18\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/CorregedorS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/DelportKO11, author = {Waldo Delport and Michael K{\"{o}}hn and Martin S. Olivier}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Isolating a cloud instance for a digital forensic investigation}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Delport\_Olivier\_Kohn.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/DelportKO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Egan11, author = {Shaun Egan}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {An Evaluation of Lightweight Classification Methods for Identifying Malicious URLs}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/49\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Egan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/FoucheT11, author = {Nico Pieter Fouche and Kerry{-}Lynn Thomson}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Exploring the Human Dimension of {TETRA}}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/39\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/FoucheT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GalpinF11, author = {Ryan Galpin and Stephen Flowerday}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Online Social Networks: Enhancing user trust through effective controls and identity management}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/16\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GalpinF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GossB11, author = {Ryan Gavin Goss and Reinhardt A. Botha}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Traffic Management in Next Generation Service Provider Networks - Are We There Yet?}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/38\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GossB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GroblerDNL11, author = {Marthie Grobler and Zama Dlamini and Sipho Ngobeni and Aubrey Labuschagne}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Towards a Cyber security aware rural community}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Grobler.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GroblerDNL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HunterI11, author = {Samuel O. Hunter and Barry Irwin}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Tartarus: {A} honeypot based malware tracking and mitigation framework}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Hunter.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/HunterI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/IsherwoodC11, author = {Donovan Isherwood and Marijke Coetzee}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Enhancing Digital Business Ecosystem Trust and Reputation with Centrality Measures}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/57\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/IsherwoodC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KarokolaKY11, author = {Geoffrey Karokola and Stewart Kowalski and Louise Yngstr{\"{o}}m}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Secure e-Government Services: Towards {A} Framework for Integrating {IT} Security Services into e-Government Maturity Models}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/31\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KarokolaKY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KayemMA11, author = {Anne V. D. M. Kayem and Patrick Martin and Selim G. Akl}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/07\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KayemMA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KhanyileTD11, author = {Nontokozo P. Khanyile and Jules{-}Raymond Tapamo and Erick Dube}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A Comparative Study of Fingerprint Thinning algorithms}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Khanyile\_Tapamo\_Dube.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KhanyileTD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KoletkaH11, author = {Robert Koletka and Andrew Hutchison}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {An Architecture for Secure Searchable Cloud Storage}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/33\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KoletkaH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KrugerFDS11, author = {Hennie A. Kruger and Stephen Flowerday and Lynette Drevin and Tjaart Steyn}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {An assessment of the role of cultural factors in information security awareness}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/93\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KrugerFDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/LabuschagneVB11, author = {Aubrey Labuschagne and Namosha Veerasamy and Ivan Burke}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Design of cyber security awareness game utilizing a social media framework}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/79\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/LabuschagneVB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MabutoV11, author = {Enos K. Mabuto and Hein S. Venter}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {State of the Art of Digital Forensic Techniques}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Mabuto\_Venter.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MabutoV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OcholaE11, author = {Elisha O. Ochola and Mariki M. Eloff}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A Review of Black Hole attack on {AODV} Routing in {MANET}}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Ochola\_Eloff.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/OcholaE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/RakitianskaiaOC11, author = {Anastassia S. Rakitianskaia and Martin S. Olivier and Antony K. Cooper}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Nature and Forensic investigation of crime in Second Life}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Rakitianskaia\_Olivier\_Cooper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/RakitianskaiaOC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ReidNS11, author = {Rayne Reid and Johan Van Niekerk and Rossouw von Solms}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Guidelines for the creation of brain compatible cyber security educational material in Moodle 2.0}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/06\_Paper.pdf}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/ReidNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SavolaH11, author = {Reijo Savola and Petri Heinonen}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A Visualization and Modeling Tool for Security Metrics and Measurements Management}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/09\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/SavolaH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SerraV11, author = {Stephen Serra and Hein S. Venter}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Mobile cyber-bullying: {A} proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/99\_paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/SerraV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ShahzadN11, author = {Raja Khurram Shahzad and Niklas Lavesson}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Detecting Scareware by Mining Variable Length Instruction Sequences}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/28\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ShahzadN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SolmsTM11, author = {Rossouw von Solms and Kerry{-}Lynn Thomson and Mvikeli Maninjwa}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Information Security Governance control through comprehensive policy architectures}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/26\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/SolmsTM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/StadenV11, author = {Franscois Van Staden and Hein S. Venter}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Adding digital forensic readiness to electronic communication using a security monitoring tool}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/70\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/StadenV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Stalmans11, author = {Etienne Stalmans}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A Framework for {DNS} based detection and mitigation of malware infections on a network}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/44\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Stalmans11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/StraussO11, author = {Tinus Strauss and Martin S. Olivier}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Network Forensics in a Clean-Slate Internet Architecture}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/94\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/StraussO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/TarwireyiFB11, author = {Paul Tarwireyi and Stephen Flowerday and Anass Bayaga}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Information Security Competence Test with Regards to Password Management}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/29\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/TarwireyiFB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ValjarevicV11, author = {Aleksandar Valjarevic and Hein S. Venter}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Towards a Digital Forensics Readiness Framework for Public Key Infrastructure Systems}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/66\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ValjarevicV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/VeerasamyE11, author = {Namosha Veerasamy and Jan H. P. Eloff}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {{UML} Modelling Of Network Warfare Examples}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Veerasamy.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/VeerasamyE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/WinkelvosRR11, author = {Timo Winkelvos and Carsten Rudolph and J{\"{u}}rgen Repp}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A Property Based Security Risk Analysis Through Weighted Simulation}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/55\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/WinkelvosRR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2011, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, isbn = {978-1-4577-1482-5}, timestamp = {Wed, 08 Feb 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.