default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 40 matches
- 2011
- Sean Allam, Stephen Flowerday:
An adaptation of the awareness boundary model towards smartphone security. ISSA 2011 - Endre Bangerter, Stephan Krenn, Matrial Seifriz, Ulrich Ultes-Nitsche:
cPLC - A Cryptographic Programming Language and Compiler. ISSA 2011 - Hector Beyers, Martin S. Olivier, Gerhard P. Hancke:
An approach to examine the Metadata and Data of a database Management System by making use of a forensic comparison tool. ISSA 2011 - Anton Borg, Martin Boldt, Niklas Lavesson:
Informed Software Installation Through License Agreement Categorization. ISSA 2011 - Duane Boucher, Stephen Flowerday:
Privacy: In pursuit of Information security awareness. ISSA 2011 - Ivan Daniel Burke, Martin S. Olivier:
Analysing the fairness of trust-based Mobile Ad Hoc Network protocols. ISSA 2011 - Mariana Carroll, Paula Kotzé, Alta van der Merwe:
Secure Cloud Computing: Benefits, Risks and Controls. ISSA 2011 - Ka Fai Peter Chan:
Secret sharing in audio steganography. ISSA 2011 - Jacques Coertze, Johan Van Niekerk, Rossouw von Solms:
A web-based information security governance toolbox for small-to-medium enterprises in Southern Africa. ISSA 2011 - Manuel Corregedor, Sebastiaan H. von Solms:
Implementing Rootkits to Address Operating System Vulnerabilities. ISSA 2011 - Waldo Delport, Michael Köhn, Martin S. Olivier:
Isolating a cloud instance for a digital forensic investigation. ISSA 2011 - Shaun Egan:
An Evaluation of Lightweight Classification Methods for Identifying Malicious URLs. ISSA 2011 - Nico Pieter Fouche, Kerry-Lynn Thomson:
Exploring the Human Dimension of TETRA. ISSA 2011 - Ryan Galpin, Stephen Flowerday:
Online Social Networks: Enhancing user trust through effective controls and identity management. ISSA 2011 - Ryan Gavin Goss, Reinhardt A. Botha:
Traffic Management in Next Generation Service Provider Networks - Are We There Yet? ISSA 2011 - Marthie Grobler, Zama Dlamini, Sipho Ngobeni, Aubrey Labuschagne:
Towards a Cyber security aware rural community. ISSA 2011 - Samuel O. Hunter, Barry Irwin:
Tartarus: A honeypot based malware tracking and mitigation framework. ISSA 2011 - Donovan Isherwood, Marijke Coetzee:
Enhancing Digital Business Ecosystem Trust and Reputation with Centrality Measures. ISSA 2011 - Geoffrey Karokola, Stewart Kowalski, Louise Yngström:
Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models. ISSA 2011 - Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl:
Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data. ISSA 2011 - Nontokozo P. Khanyile, Jules-Raymond Tapamo, Erick Dube:
A Comparative Study of Fingerprint Thinning algorithms. ISSA 2011 - Robert Koletka, Andrew Hutchison:
An Architecture for Secure Searchable Cloud Storage. ISSA 2011 - Hennie A. Kruger, Stephen Flowerday, Lynette Drevin, Tjaart Steyn:
An assessment of the role of cultural factors in information security awareness. ISSA 2011 - Aubrey Labuschagne, Namosha Veerasamy, Ivan Burke:
Design of cyber security awareness game utilizing a social media framework. ISSA 2011 - Enos K. Mabuto, Hein S. Venter:
State of the Art of Digital Forensic Techniques. ISSA 2011 - Elisha O. Ochola, Mariki M. Eloff:
A Review of Black Hole attack on AODV Routing in MANET. ISSA 2011 - Anastassia S. Rakitianskaia, Martin S. Olivier, Antony K. Cooper:
Nature and Forensic investigation of crime in Second Life. ISSA 2011 - Rayne Reid, Johan Van Niekerk, Rossouw von Solms:
Guidelines for the creation of brain compatible cyber security educational material in Moodle 2.0. ISSA 2011 - Reijo Savola, Petri Heinonen:
A Visualization and Modeling Tool for Security Metrics and Measurements Management. ISSA 2011 - Stephen Serra, Hein S. Venter:
Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness. ISSA 2011
skipping 10 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-28 18:02 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint