![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 453 matches
- 2020
- Hein S. Venter
, Marianne Loock
, Marijke Coetzee
, Mariki M. Eloff
, Jan H. P. Eloff
:
Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings. Communications in Computer and Information Science 1166, Springer 2020, ISBN 978-3-030-43275-1 [contents] - 2019
- Kenneth Ayong, Rennie Naidoo:
An Institutional Trust Perspective of Cloud Adoption Among SMEs in South Africa. ISSA 2019: 145-157 - Abdramane Bah, Pascal André, J. Christian Attiogbé, Jacqueline Konaté:
Federation of Services from Autonomous Domains with Heterogeneous Access Control Models. ISSA 2019: 83-98 - Ntsako Baloyi, Paula Kotzé
:
Data Privacy Compliance Benefits for Organisations - A Cyber-Physical Systems and Internet of Things Study. ISSA 2019: 158-172 - Anthony Bolton
, Leila Goosen
, Elmarie Kritzinger
:
Security Aspects of an Empirical Study into the Impact of Digital Transformation via Unified Communication and Collaboration Technologies on the Productivity and Innovation of a Global Automotive Enterprise. ISSA 2019: 99-113 - Sunthoshan G. Govender, Elmarie Kritzinger, Marianne Loock:
Information Security Cost Reduction Through Social Means. ISSA 2019: 1-14 - Indren Govender, Bruce Watson:
Theorising Information Security Policy Violations. ISSA 2019: 131-144 - Gershon Hutchinson, Jacques Ophoff
:
A Descriptive Review and Classification of Organizational Information Security Awareness Research. ISSA 2019: 114-130 - Faith Lekota
, Marijke Coetzee
:
An Aviation Sector CSIRT for Sub-Saharan Africa. ISSA 2019: 28-42 - Sophia Moganedi, Dalenca Pottas:
Threats and Vulnerabilities Affecting Fitness Wearables: Security and Privacy Theoretical Analysis. ISSA 2019: 57-68 - Dirk Snyman
, Hennie A. Kruger
:
A Management Decision Support System for Evaluating Information Security Behaviour. ISSA 2019: 15-27 - Jaco du Toit
:
PAUDIT: A Distributed Data Architecture for Fitness Data. ISSA 2019: 43-56 - Lelethu Zazaza
, H. S. Venter
, George Sibiya
:
A Conceptual Model for Consent Management in South African e-Health Systems for Privacy Preservation. ISSA 2019: 69-82 - Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff:
Information Security - 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers. Communications in Computer and Information Science 973, Springer 2019, ISBN 978-3-030-11406-0 [contents] - 2018
- Edwin Donald Frauenstein
:
An Investigation into Students Responses to Various Phishing Emails and Other Phishing-Related Behaviours. ISSA (Revised Selected Papers) 2018: 44-59 - Dustin Terence van der Haar:
Real-Time Face Antispoofing Using Shearlets. ISSA (Revised Selected Papers) 2018: 16-29 - Tetyana Loskutova
, Rivaj Parbhu:
Information Availability and Security in Foreign Corrupt Practices Act Investigations. ISSA (Revised Selected Papers) 2018: 60-75 - Zandile Manjezi, Reinhardt A. Botha
:
Preventing and Mitigating Ransomware - A Systematic Literature Review. ISSA (Revised Selected Papers) 2018: 149-162 - Pardon Blessings Maoneke
, Stephen Flowerday:
Password Policies Adopted by South African Organizations: Influential Factors and Weaknesses. ISSA (Revised Selected Papers) 2018: 30-43 - Moses Moyo
, Marianne Loock:
Small and Medium-Sized Enterprises' Understanding of Security Evaluation of Cloud-Based Business Intelligence Systems and Its Challenges. ISSA (Revised Selected Papers) 2018: 133-148 - Jan Hendrik van Niekerk, Elizabeth Marie Ehlers:
SA-EF Cube: An Evaluation Framework for Assessing Intelligent Context-Aware Critical Information Infrastructure Protection Solutions. ISSA (Revised Selected Papers) 2018: 115-132 - Jacques Ophoff
, Mcguigan Lakay:
Mitigating the Ransomware Threat: A Protection Motivation Theory Approach. ISSA (Revised Selected Papers) 2018: 163-175 - Amaanullah Parker, Irwin Brown
:
Skills Requirements for Cyber Security Professionals: A Content Analysis of Job Descriptions in South Africa. ISSA (Revised Selected Papers) 2018: 176-192 - Heloise Pieterse, Martin S. Olivier
, Renier van Heerden:
Detecting Manipulated Smartphone Data on Android and iOS Devices. ISSA (Revised Selected Papers) 2018: 89-103 - Silas Formunyuy Verkijika
:
An Evaluation of the Password Practices on Leading e-Commerce Websites in South Africa. ISSA (Revised Selected Papers) 2018: 104-114 - William Thomas Weilbach
, Yusuf Moosa Motara
:
Distributed Ledger Technology to Support Digital Evidence Integrity Verification Processes. ISSA (Revised Selected Papers) 2018: 1-15 - Lelethu Zazaza
, H. S. Venter
, George Sibiya
:
The Current State of Electronic Consent Systems in e-Health for Privacy Preservation. ISSA (Revised Selected Papers) 2018: 76-88 - 2017
- Mohammad Aldabbas, Stephanie Teufel
, Bernd Teufel
:
The importance of security culture for crowd energy systems. ISSA 2017: 10-15 - Sarathiel Chaipa
, Mariki M. Eloff:
Towards the development of an effective intrusion detection model. ISSA 2017: 32-39 - Ibraheem Frieslaar, Barry Irwin
:
Investigating the electromagnetic side channel leakage from a Raspberry Pi. ISSA 2017: 24-31
skipping 423 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-03 13:16 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint