Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
96 | Phillip A. Porras, Martin W. Fong, Alfonso Valdes |
A Mission-Impact-Based Approach to INFOSEC Alarm Correlation. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
intrusion report correlation, alert management, alert prioritization, Network security |
55 | |
2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015 |
InfoSec |
2015 |
DBLP BibTeX RDF |
|
55 | Mustafa Hassan Saad, Ahmed Serageldin, Goda Ismaeel Salama |
Android spyware disease and medication. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Eric Amankwa, Marianne Loock, Elmarie Kritzinger |
Enhancing information security education and awareness: Proposed characteristics for a model. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Shabier Parker, Jean-Paul Van Belle |
Lifelogging and lifeblogging: Privacy issues and influencing factors in South Africa. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Bassey Isong, Naison Gasela, Ifeoma U. Ohaeri, Elegbeleye Femi |
RFID-based design-theoretical framework for combating police impersonation in South Africa. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Mostafa Doroudian, Narges Arastouie, Mohammad Talebi, Ali Reza Ghanbarian |
Multilayered database intrusion detection system for detecting malicious behaviors in big data transaction. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | T. Charles, M. Pollock |
Digital forensic investigations at universities in South Africa. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Reema Al Mushcab, Pavel Gladyshev |
The significance of different backup applications in retrieving social networking forensic artifacts from Android-based mobile devices. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Haoua Cheribi, Mohamed-Khireddine Kholladi |
A security model for complex applications based on normative multi-agents system. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Zahra Waheed, M. Usman Akram, Amna Waheed, Arslan Shaukat |
Robust extraction of blood vessels for retinal recognition. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Fayyaadh Parker, Jacques Ophoff, Jean-Paul Van Belle, Ross Karia |
Security awareness and adoption of security controls by smartphone users. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Mvelo Walaza, Marianne Loock, Elmarie Kritzinger |
A pragmatic approach towards the integration of ICT security awareness into the South African education system. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Ruilin Zhu, Lech J. Janczewski |
Typology of information systems security research: A methodological perspective. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Muhammad Najam Dar, M. Usman Akram, Anam Usman, Shoab Ahmad Khan |
ECG biometric identification for general population using multiresolution analysis of DWT based features. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Madiha Tahir, M. Usman Akram |
Online signature verification using hybrid features. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Ar Kar Kyaw, Yuzhu Chen, Justin Joseph |
Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Walid Al-Ahmad, Basil Mohammed |
A code of practice for effective information security risk management using COBIT 5. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Wenli Shang, Ming Wan, Peng Zeng 0001, Quansheng Qiao |
Research on self-learning method on generation and optimization of industrial firewall rules. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Nyalleng Moorosi, Vukosi Marivate |
Privacy in mining crime data from social Media: A South African perspective. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Lineo Mejaele, Elisha Oketch Ochola |
Analysing the impact of black hole attack on DSR-based MANET: The hidden network destructor. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Antesar M. Shabut, Keshav P. Dahal, Irfan Awan, Zeeshan Pervez |
Route optimasation based on multidimensional trust evaluation model in mobile ad hoc networks. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Muhammad Sarfraz 0001, Syed M. A. J. Rizvi |
An intelligent system for Online Signature Verification. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Topside E. Mathonsi |
Optimized handoff and secure roaming model for wireless networks. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Ar Kar Kyaw, Franco Sioquim, Justin Joseph |
Dictionary attack on Wordpress: Security and forensic analysis. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Michael Hopkins, Ali Dehghantanha |
Exploit Kits: The production line of the Cybercrime economy? |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Delwar Alam, Touhid Bhuiyan, Md. Alamgir Kabir, Tanjila Farah |
SQLi vulnerabilty in education sector websites of Bangladesh. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Kevin Hughes, Adrie Stander, Val A. Hooper |
eDiscovery in South Africa and the challenges it faces. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Ileen E. van Vuuren, Elmarie Kritzinger, Conrad Mueller |
Identifying gaps in IT retail Information Security policy implementation processes. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
55 | Kennedy Njenga, Sifiso Ndlovu |
Mobile banking and information security risks: Demand-side predilections of South African lead-users. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
52 | E. Eugene Schultz |
Non-infosec professionals in infosec? |
Comput. Secur. |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Merv Matson, Mihaela Ulieru |
The 'how' and 'why' of persistent information security. |
PST |
2006 |
DBLP DOI BibTeX RDF |
avaliability, emergency response operations, information custodian, infosec, persistent information security, integrity, information security, confidentiality, digital rights management, DRM |
31 | Errol A. Blake |
The management of access controls/biometrics in organizations. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
IT spending, access control policy (ACP), cyber risk insurance, information technology (IT) information security (InfoSec), system specific policy (SSP), authentication, trust, policy, risk management, systems, return on investment (ROI) |
31 | Kenneth R. van Wyk, Gary McGraw |
Bridging the Gap between Software Development and Information Security. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
building security in, BSI, infosec, softdev |
26 | Rebekah E. Austin |
The Interplay of InfoSec Mindfulness and Sanctions on Extra Role Security Behaviors: A Trait Activation Perspective. |
AMCIS |
2023 |
DBLP BibTeX RDF |
|
26 | Andriana Magdalinou, Athena Kalokairinou, Flora Malamateniou, John Mantas |
SNA: The Optimal Nodes to Raise Nurses' Infosec Awareness. |
ICIMTH |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Ethan M. Rudd, Mohammad Saidur Rahman 0002, Philip Tully |
Transformers for End-to-End InfoSec Tasks: A Feasibility Study. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Byron Marshall, Michael Curry, Robert E. Crossler, John Correia |
Machine Learning and Survey-based Predictors of InfoSec Non-Compliance. |
ACM Trans. Manag. Inf. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Leigh A. Mutchler, Amy J. Connolly |
How to Increase InfoSec Compliance by Matching the Messaging to the Right Users? |
AMCIS |
2022 |
DBLP BibTeX RDF |
|
26 | Ethan M. Rudd, Mohammad Saidur Rahman 0002, Philip Tully |
Transformers for End-to-End InfoSec Tasks: A Feasibility Study. |
WoRMA@AsiaCCS |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Yasir Gokce |
Commissioning Development to Externals: Addressing Infosec Risks Upfront. |
Int. J. Cyber Warf. Terror. |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Rauli Kaksonen, Tommi Järvenpää, Jukka Pajukangas, Mihai Mahalean, Juha Röning |
100 Popular Open-Source Infosec Tools. |
SEC |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Leigh A. Mutchler, Amy J. Connolly, Daniel Rush |
Marrying the Agile Framework with InfoSec Management Education. |
AMCIS |
2021 |
DBLP BibTeX RDF |
|
26 | Dalal N. Alharthi |
Social Engineering Defense Mechanisms and InfoSec Policies: A Survey and Qualitative Analysis. |
|
2021 |
RDF |
|
26 | Michael Curry, Byron Marshall, John Correia, Robert E. Crossler |
InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior. |
J. Inf. Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
26 | M. Mohamed Asan Basiri, Sandeep K. Shukla |
Formal Hardware Verification of InfoSec Primitives. |
ISVLSI |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Michael Curry, Byron Marshall, Robert E. Crossler, John Correia |
InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior. |
Data Base |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Jorge Blasco, Elizabeth A. Quaglia |
InfoSec Cinema: Using Films for Information Security Teaching. |
ASE @ USENIX Security Symposium |
2018 |
DBLP BibTeX RDF |
|
26 | Jessica Stockett |
Dr. InfoSec: How to Teach Your Community to Stop Worrying and Love 2-Factor Authentication. |
SIGUCCS |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Mark-David McLaughlin, Janis L. Gogan |
InfoSec Research in Prominent IS Journals: Findings and Implications for the CIO and Board of Directors. |
HICSS |
2017 |
DBLP BibTeX RDF |
|
26 | Rita Heimes |
Global InfoSec and Breach Standards. |
IEEE Secur. Priv. |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Eli Rohn, Gilad Sabari, Guy Leshem |
Explaining small business InfoSec posture using social theories. |
Inf. Comput. Secur. |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Sarfraz Iqbal |
Design and Emergence of a Pedagogical Online InfoSec Laboratory as an Ensemble Artefact. |
J. Inf. Syst. Educ. |
2016 |
DBLP BibTeX RDF |
|
26 | Bahareh Shojaie, Hannes Federrath, Iman Saberi |
Getting the Full Benefits of the ISO 27001 to Develop an ISMS based on Organisations’ InfoSec Culture. |
HAISA |
2016 |
DBLP BibTeX RDF |
|
26 | Fredrik Karlsson 0001, Göran Goldkuhl, Karin Hedström |
Practice-Based Discourse Analysis of InfoSec Policies. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Jason Andress |
The basics of information security - understanding the fundamentals of InfoSec in theory and practice, Second edition. |
|
2014 |
RDF |
|
26 | Mark-David McLaughlin, Janis L. Gogan |
INFOSEC in a Basket, 2004-2013. |
AMCIS |
2014 |
DBLP BibTeX RDF |
|
26 | Katina Michael |
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. |
Comput. Secur. |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Tara Whalen, Carrie Gates |
Watching the watchers: "voluntary monitoring" of infosec employees. |
Inf. Manag. Comput. Secur. |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Tara Whalen, Carrie Gates |
Watchdog or Guardian? Unpacking the Issues Surrounding the Monitoring of InfoSec Employees. |
HAISA |
2009 |
DBLP BibTeX RDF |
|
26 | Nicholas J. Macias, Peter M. Athanas |
Architecturally-Enforced InfoSec in a General-Purpose Self-Configurable System. |
BLISS |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Anand Gupta, Deepank Gupta, Nidhi Gupta |
InfoSec-MobCop - Framework for Theft Detection and Data Security on Mobile Computing Devices. |
IC3 |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Camilo H. Viecco, L. Jean Camp |
A Life or Death InfoSec Subversion. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
26 | E. Eugene Schultz |
What infosec changes are likely to result from the recent US election? |
Comput. Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
26 | E. Eugene Schultz |
Struggles in the academic side of infosec. |
Comput. Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Erwin Louis Carrow |
InfoSec technology management of user space and services through security threat gateways. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
26 | E. Eugene Schultz |
Predicting the future of InfoSec. |
Comput. Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
26 | E. Eugene Schultz |
Infosec certification: Which way do we turn from here? |
Comput. Secur. |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Herbert J. Mattord, Michael E. Whitman |
INFOSEC Policy - The Foundation for an Effective Security Program. |
Encyclopedia of Information Science and Technology (III) |
2005 |
DBLP BibTeX RDF |
|
26 | Stephen W. Neville |
Necessary conditions for determining a robust time threshold in standard INFOSEC alert clustering algorithms. |
SMC |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Stephen Neville |
Are Deeper Levels of Risk Analysis a Requirement for Enabling Optimal Tactical Responses in INFOSEC Alert Correlation Systems? |
PST |
2005 |
DBLP BibTeX RDF |
|
26 | Xinzhou Qin |
A Probabilistic-Based Framework for INFOSEC Alert Correlation. |
|
2005 |
RDF |
|
26 | Xinzhou Qin, Wenke Lee |
Discovering Novel Attack Strategies from INFOSEC Alerts. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Steven J. Greenwald, Kenneth G. Olthoff, Victor Raskin, Willibald Ruch |
The user non-acceptance paradigm: INFOSEC's dirty little secret. |
NSPW |
2004 |
DBLP DOI BibTeX RDF |
|
26 | E. Eugene Schultz |
Why can't Microsoft stay out of the InfoSec headlines? |
Comput. Secur. |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Xinzhou Qin, Wenke Lee |
Statistical Causality Analysis of INFOSEC Alert Data. |
RAID |
2003 |
DBLP DOI BibTeX RDF |
attack scenario analysis, Intrusion detection, time series analysis, alert correlation |
26 | Gerald L. Kovacich, Andy Jones |
What InfoSec professionals should know about information warfare tactics by terrorists. |
Comput. Secur. |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Gerald L. Kovacich, Andy Jones |
What InfoSec Professionals Should Know About Information Warfare Tactics by Terrorists. |
Comput. Secur. |
2002 |
DBLP DOI BibTeX RDF |
|
26 | M. E. Kabay |
Time for industry to support academic INFOSEC. |
Ubiquity |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Gary McGraw, J. Gregory Morrisett |
Attacking Malicious Code: A Report to the Infosec Research Council. |
IEEE Softw. |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Gunnar O. Klein |
Trusted Health Information Systems: A project within the DG XIII/INFOSEC programme on Electronic Signatures and Trusted Third Parties. |
Towards Security in Medical Telematics |
1996 |
DBLP DOI BibTeX RDF |
|
26 | Charles Cresson Wood |
Writing infosec policies. |
Comput. Secur. |
1995 |
DBLP DOI BibTeX RDF |
|
26 | Andrey P. Kurilo |
The Current State of INFOSEC Legislation. |
Security and Control of Information Technology in Society |
1993 |
DBLP BibTeX RDF |
|
26 | Frank L. Mayer, William Curtis Barker, Theresa K. Haley, J. Noelle McAuliffe, Daniel F. Sterne, Lynne S. Vidmar |
Evaluation issues for an integrated 'INFOSEC' product. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
23 | Marianthi Theoharidou, Dimitris Gritzalis |
Common Body of Knowledge for Information Security. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Rose-Mharie Åhlfeldt, Paolo Spagnoletti, Guttorm Sindre |
Improving the Information Security Model by using TFI. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Michael E. Whitman, Herbert J. Mattord |
Developing the BS-ISA: lessons learned and future directions - sponsored by NSF grant # DUE-0516192. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
curriculum instruction, information assurance curriculum, information security curriculum, information security, curriculum development, information assurance |
23 | Michael E. Whitman, Herbert J. Mattord |
Workshop on designing and teaching information security curriculum. |
ACM Southeast Regional Conference (1) |
2005 |
DBLP DOI BibTeX RDF |
information security curriculum development, information security, information security education |
23 | Paul D. Williams, Kevin P. Anchor, John L. Bebo, Gregg H. Gunsch, Gary B. Lamont |
CDIS: Towards a Computer Immune System for Detecting Network Intrusions. |
Recent Advances in Intrusion Detection |
2001 |
DBLP DOI BibTeX RDF |
|
23 | Rayford B. Vaughn |
Application of security tot he computing science classroom. |
SIGCSE |
2000 |
DBLP DOI BibTeX RDF |
|
23 | Angelos P. Varvitsiotis, Despina Polemi, Andy Marsh |
EUROMED-JAVA: Trusted Third Party Services for Securing Medical Java Applets. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
Telemedical Applications, Trusted Third Party Services, EUROMED, EUROMED-ETS, Java, Web |