default search action
14th ISSA 2015: Johannesburg, South Africa
- Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Stephen Flowerday:
2015 Information Security for South Africa, ISSA 2015, Johannesburg, South Africa, August 12-13, 2015. IEEE 2015, ISBN 978-1-4799-7755-0 - Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff:
Introduction. 1 - Murdoch Watney:
State-on-nationals' electronic communication surveillance in South Africa: A murky legal landscape to navigate? 1-6 - Kishor Krishnan Nair, Albert Helberg, Johan Van Der Merwe:
Intrusion detection in Bluetooth enabled mobile phones. 1-8 - Dayne Edward Skolmen, Mariana Gerber:
Protection of Personal Information in the South African Cloud Computing environment: A framework for Cloud Computing adoption. 1-10 - Victor R. Kebande, Hein S. Venter:
Adding event reconstruction to a Cloud Forensic Readiness model. 1-9 - Karen Renaud, Andrew Hoskins, Rossouw von Solms:
Biometric identification: Are we ethically ready? 1-8 - Melissa Ingles, Aleksandar Valjarevic, Hein S. Venter:
Evaluation and analysis of a software prototype for guidance and implementation of a standardized digital forensic investigation process. 1-8 - Bessy Mahopo, Hanifa Abdullah, Mathias Mujinga:
A formal qualitative risk management approach for IT security. 1-8 - J. G. Botha, Mariki M. Eloff, I. Swart:
The effects of the PoPI Act on small and medium enterprises in South Africa. 1-8 - Suné von Solms:
An investigation into credit card information disclosure through Point of Sale purchases. 1-8 - Brian Greaves, Marijke Coetzee:
Access control for local personal smart spaces. 1-8 - Roderick Mooi, Reinhardt A. Botha:
Prerequisites for building a Computer Security Incident Response capability. 1-8 - T. D. Ramotsoela, Gerhard P. Hancke:
Data aggregation using homomorphic encryption in wireless sensor networks. 1-8 - Jaco du Toit, Ian Ellefsen:
Location aware mobile device management. 1-8 - Jared Naude, Lynette Drevin:
The adversarial threat posed by the NSA to the integrity of the internet. 1-7 - Reijo M. Savola, Pekka Savolainen, Antti Evesti, Habtamu Abie, Markus Sihvonen:
Risk-driven security metrics development for an e-health IoT application. 1-6 - Irene Govender:
Mapping 'Security Safeguard' Requirements in a data privacy legislation to an international privacy framework: A compliance methodology. 1-8 - Jabu Mtsweni:
Analyzing the security posture of South African websites. 1-8 - Keshnee Padayachee:
A framework of opportunity-reducing techniques to mitigate the insider threat. 1-8 - Heloise Pieterse, Martin S. Olivier, Renier P. van Heerden:
Playing hide-and-seek: Detecting the manipulation of Android Timestamps. 1-8 - Peter M. Wrench, Barry V. W. Irwin:
Towards a PHP webshell taxonomy using deobfuscation-assisted similarity analysis. 1-8 - Thembekile O. Mayayise, Isaac Olusegun Osunmakinde:
Robustness of computational intelligent assurance models when assessing e-Commerce sites. 1-8 - Jason Jordaan, Karen L. Bradshaw:
The current state of digital forensic practitioners in South Africa. 1-9 - Lauren Rudman, Barry V. W. Irwin:
Characterization and analysis of NTP amplification based DDoS attacks. 1-5 - Paul Muntean, Mustafizur Rahman, Andreas Ibing, Claudia Eckert:
SMT-constrained symbolic execution engine for integer overflow detection in C code. 1-8 - Werner K. Hauger, Martin S. Olivier:
The state of database forensic research. 1-8 - Mc Donald Van der Merwe, Wynand J. C. van Staden:
Unsolicited Short Message Service marketing: A preliminary investigation into individual acceptance, perceptions of content, and privacy concerns. 1-7 - Tayana Morkel:
Self-sanitization of digital images using steganography. 1-6 - Luke Lubbe, Martin Oliver:
Beacons and their uses for digital forensics purposes. 1-6 - D. J. E. Masvosvere, Hein S. Venter:
A model for the design of next generation e-supply chain digital forensic readiness tools. 1-9 - Andrea Herrera, Lech J. Janczewski:
Cloud supply chain resilience. 1-9 - Martin S. Olivier:
Towards a digital forensic science. 1-8 - Gregory Stuart Smith, Marijke Coetzee:
AFA-RFID: Physical layer authentication for passive RFID tags. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.