Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff (eds.) |
Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings |
ISSA |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Abdramane Bah, Pascal André, J. Christian Attiogbé, Jacqueline Konaté |
Federation of Services from Autonomous Domains with Heterogeneous Access Control Models. |
ISSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Anthony Bolton, Leila Goosen, Elmarie Kritzinger |
Security Aspects of an Empirical Study into the Impact of Digital Transformation via Unified Communication and Collaboration Technologies on the Productivity and Innovation of a Global Automotive Enterprise. |
ISSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Indren Govender, Bruce Watson |
Theorising Information Security Policy Violations. |
ISSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth Ayong, Rennie Naidoo |
An Institutional Trust Perspective of Cloud Adoption Among SMEs in South Africa. |
ISSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Lelethu Zazaza, H. S. Venter, George Sibiya |
A Conceptual Model for Consent Management in South African e-Health Systems for Privacy Preservation. |
ISSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Dirk Snyman, Hennie A. Kruger |
A Management Decision Support System for Evaluating Information Security Behaviour. |
ISSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Faith Lekota, Marijke Coetzee |
An Aviation Sector CSIRT for Sub-Saharan Africa. |
ISSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Sunthoshan G. Govender, Elmarie Kritzinger, Marianne Loock |
Information Security Cost Reduction Through Social Means. |
ISSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ntsako Baloyi, Paula Kotzé |
Data Privacy Compliance Benefits for Organisations - A Cyber-Physical Systems and Internet of Things Study. |
ISSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Gershon Hutchinson, Jacques Ophoff |
A Descriptive Review and Classification of Organizational Information Security Awareness Research. |
ISSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jaco du Toit |
PAUDIT: A Distributed Data Architecture for Fitness Data. |
ISSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Sophia Moganedi, Dalenca Pottas |
Threats and Vulnerabilities Affecting Fitness Wearables: Security and Privacy Theoretical Analysis. |
ISSA |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Javan Mnjama, Greg Foster, Barry Irwin |
A privacy and security threat assessment framework for consumer health wearables. |
ISSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Werner K. Hauger, Martin S. Olivier |
Forensic attribution in NoSQL databases. |
ISSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ambrosio Patricio Vumo, Josef Spillner, Stefan Köpsell |
Analysis of Mozambican websites: How do they protect their users? |
ISSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff (eds.) |
2017 Information Security for South Africa, ISSA 2017, Johannesburg, South Africa, August 16-17, 2017 |
ISSA |
2017 |
DBLP BibTeX RDF |
|
1 | Mohammad Aldabbas, Stephanie Teufel, Bernd Teufel |
The importance of security culture for crowd energy systems. |
ISSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sean Pennefather, Barry Irwin |
Design and application of link: A DSL for network frame manipulation. |
ISSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sarathiel Chaipa, Mariki M. Eloff |
Towards the development of an effective intrusion detection model. |
ISSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Adéle da Veiga, Ruthea Vorster, Colin Pilkington, Hanifa Abdullah |
Compliance with the protection of personal information act and consumer privacy expectations: A comparison between the retail and medical aid industry. |
ISSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Francois Mouton, Alastair Nottingham, Louise Leenen, H. S. Venter |
Underlying finite state machine for the social engineering attack detection model. |
ISSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Francois Mouton, Marcel Teixeira, Thomas Meyer 0002 |
Benchmarking a mobile implementation of the social engineering prevention training tool. |
ISSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nkosinathi Mpofu, Wynand J. C. van Staden |
Evaluating the severity of trust to identity- management-as-a-service. |
ISSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ibraheem Frieslaar, Barry Irwin |
Investigating the electromagnetic side channel leakage from a Raspberry Pi. |
ISSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Karen Renaud, Verena Zimmermann |
Enriched nudges lead to stronger password replacements ... but implement mindfully. |
ISSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | David Kenyon, Jan H. P. Eloff |
Big data science for predicting insurance claims fraud. |
ISSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Marc Pelteret, Jacques Ophoff |
Organizational information privacy strategy and the impact of the PoPI act. |
ISSA |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lineo Mejaele, Elisha Oketch Ochola |
Effect of varying node mobility in the analysis of black hole attack on MANET reactive routing protocols. |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Petrus M. J. Delport, Mariana Gerber, Nader Sohrabi Safa |
An interactive visual library model to improve awareness in handling of business information. |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Wynand J. C. van Staden, Etienne van der Poel |
Team formation in digital forensics. |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Chollette C. Olisah, Peter Ogedebe |
Recognizing surgically altered faces using local edge gradient Gabor magnitude pattern. |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | J. N. Samuel, Warren P. Du Plessis |
Specific emitter identification for enhanced access control security. |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yusuf Moosa Motara, Barry Irwin |
SHA-1 and the Strict Avalanche Criterion. |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nicholas Scharnick, Mariana Gerber, Lynn Futcher |
Review of data storage protection approaches for POPI compliance. |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mfundo Glenn Masango, Francois Mouton, Alastair Nottingham, Jabu Mtsweni |
Context Aware Mobile Application for mobile devices. |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Noluvuyo Fani, Rossouw von Solms, Mariana Gerber |
A framework towards governing "Bring Your Own Device in SMMEs". |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Othoman Elaswad, Christian Damsgaard Jensen |
Identity management for e-government Libya as a case study. |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Paulus Swartz, Adéle da Veiga |
PoPI Act - opt-in and opt-out compliance from a data value chain perspective: A South African insurance industry experiment. |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Johannes S. Vorster, Renier P. van Heerden, Barry Irwin |
The pattern-richness of Graphical passwords. |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Alan Herbert, Barry Irwin |
Adaptable exploit detection through scalable NetFlow analysis. |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ryan De Kock, Lynn Ann Futcher |
Mobile device usage in higher education institutions in South Africa. |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Lauren Rudman, Barry Irwin |
Dridex: Analysis of the traffic and automatic generation of IOCs. |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff (eds.) |
2016 Information Security for South Africa, ISSA 2016, Johannesburg, South Africa, August 17-18, 2016 |
ISSA |
2016 |
DBLP BibTeX RDF |
|
1 | Olanrewaju B. Wojuola, Stanley H. Mneney, Viranjay M. Srivastava |
CDMA in signal encryption and information security. |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Monamo, Vukosi Marivate, Bheki Twala |
Unsupervised learning for robust Bitcoin fraud detection. |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Edwin Donald Frauenstein, Stephen V. Flowerday |
Social network phishing: Becoming habituated to clicks and ignorant to threats? |
ISSA |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Irene Govender |
Mapping 'Security Safeguard' Requirements in a data privacy legislation to an international privacy framework: A compliance methodology. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Melissa Ingles, Aleksandar Valjarevic, Hein S. Venter |
Evaluation and analysis of a software prototype for guidance and implementation of a standardized digital forensic investigation process. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jaco du Toit, Ian Ellefsen |
Location aware mobile device management. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Murdoch Watney |
State-on-nationals' electronic communication surveillance in South Africa: A murky legal landscape to navigate? |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Peter M. Wrench, Barry V. W. Irwin |
Towards a PHP webshell taxonomy using deobfuscation-assisted similarity analysis. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tayana Morkel |
Self-sanitization of digital images using steganography. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Thembekile O. Mayayise, Isaac Olusegun Osunmakinde |
Robustness of computational intelligent assurance models when assessing e-Commerce sites. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | T. D. Ramotsoela 0001, Gerhard P. Hancke 0002 |
Data aggregation using homomorphic encryption in wireless sensor networks. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jabu Mtsweni |
Analyzing the security posture of South African websites. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Karen Renaud, Andrew Hoskins, Rossouw von Solms |
Biometric identification: Are we ethically ready? |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Werner K. Hauger, Martin S. Olivier |
The state of database forensic research. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Suné von Solms |
An investigation into credit card information disclosure through Point of Sale purchases. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Martin S. Olivier |
Towards a digital forensic science. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | D. J. E. Masvosvere, Hein S. Venter |
A model for the design of next generation e-supply chain digital forensic readiness tools. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Paul Muntean, Mustafizur Rahman, Andreas Ibing, Claudia Eckert 0001 |
SMT-constrained symbolic execution engine for integer overflow detection in C code. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kishor Krishnan Nair, Albert Helberg, Johan Van Der Merwe |
Intrusion detection in Bluetooth enabled mobile phones. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff |
Introduction. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dayne Edward Skolmen, Mariana Gerber |
Protection of Personal Information in the South African Cloud Computing environment: A framework for Cloud Computing adoption. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Keshnee Padayachee |
A framework of opportunity-reducing techniques to mitigate the insider threat. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Brian Greaves, Marijke Coetzee |
Access control for local personal smart spaces. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Stephen Flowerday (eds.) |
2015 Information Security for South Africa, ISSA 2015, Johannesburg, South Africa, August 12-13, 2015 |
ISSA |
2015 |
DBLP BibTeX RDF |
|
1 | Jason Jordaan, Karen L. Bradshaw |
The current state of digital forensic practitioners in South Africa. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jared Naude, Lynette Drevin |
The adversarial threat posed by the NSA to the integrity of the internet. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lauren Rudman, Barry V. W. Irwin |
Characterization and analysis of NTP amplification based DDoS attacks. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Reijo M. Savola, Pekka Savolainen, Antti Evesti, Habtamu Abie, Markus Sihvonen |
Risk-driven security metrics development for an e-health IoT application. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Heloise Pieterse, Martin S. Olivier, Renier P. van Heerden |
Playing hide-and-seek: Detecting the manipulation of Android Timestamps. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gregory Stuart Smith, Marijke Coetzee |
AFA-RFID: Physical layer authentication for passive RFID tags. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Luke Lubbe, Martin Oliver |
Beacons and their uses for digital forensics purposes. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Herrera, Lech J. Janczewski |
Cloud supply chain resilience. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Victor R. Kebande, Hein S. Venter |
Adding event reconstruction to a Cloud Forensic Readiness model. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bessy Mahopo, Hanifa Abdullah, Mathias Mujinga |
A formal qualitative risk management approach for IT security. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Roderick Mooi, Reinhardt A. Botha |
Prerequisites for building a Computer Security Incident Response capability. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | J. G. Botha, Mariki M. Eloff, I. Swart |
The effects of the PoPI Act on small and medium enterprises in South Africa. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mc Donald Van der Merwe, Wynand J. C. van Staden |
Unsolicited Short Message Service marketing: A preliminary investigation into individual acceptance, perceptions of content, and privacy concerns. |
ISSA |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Pierre Schnarz, Clemens Fischer, Joachim Wietzke, Ingo Stengel |
On a domain block based mechanism to mitigate DoS attacks on shared caches in asymmetric multiprocessing multi operating systems. |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rayne Reid, Johan Van Niekerk |
From information security to cyber security cultures. |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zubeida Casmod Khan, Thulani Mashiane |
An analysis of Facebook's graph search. |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Coertze, Rossouw von Solms |
The murky waters of IT governance. |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Peter M. Wrench, Barry Irwin |
Towards a sandbox for the deobfuscation and dissection of PHP malware. |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Warren P. Du Plessis |
Software-defined radio (SDR) as a mechanism for exploring cyber-electronic warfare (EW) collaboration. |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Philip M. Trenwith, Hein S. Venter |
A digital forensic model for providing better data provenance in the cloud. |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nkosinathi Mpofu, Wynand J. C. van Staden |
A survey of trust issues constraining the growth of Identity Management-as-a-Service(IdMaaS). |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Werner K. Hauger, Martin S. Olivier |
The role of triggers in database forensics. |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Reijo M. Savola, Markku Kylänpää |
Security objectives, controls and metrics development for an Android smartphone application. |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rayne Reid, Johan Van Niekerk, Karen Renaud |
Information security culture: A general living systems theory perspective. |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Emilio Raymond Mumba, Hein S. Venter |
Mobile forensics using the harmonised digital forensic investigation process. |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nicolai Kuntze, Carsten Rudolph, Oliver Hanka |
Security foundation for a distributed cabin core architecture. |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ignus P. Swart, Barry Irwin, Marthie Grobler |
Towards a platform to visualize the state of South Africa's information security. |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kudakwashe Madzima, Moses Moyo, Hanifa Abdullah |
Is bring your own device an institutional information security risk for small-scale business organisations? |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Abdul Mirza, Makhamisa Senekane, Francesco Petruccione, Brett van Niekerk |
Suitability of quantum cryptography for national facilities. |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sean Pennefather, Barry Irwin |
An exploration of geolocation and traffic visualisation using network flows. |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wynand J. C. van Staden |
An investigation into reducing third party privacy breaches during the investigation of cybercrime. |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jaco Robertson |
Integrity of a common operating picture in military situational awareness. |
ISSA |
2014 |
DBLP DOI BibTeX RDF |
|