|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 29 publication records. Showing 29 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Mustafa Hassan Saad, Ahmed Serageldin, Goda Ismaeel Salama |
Android spyware disease and medication. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Eric Amankwa, Marianne Loock, Elmarie Kritzinger |
Enhancing information security education and awareness: Proposed characteristics for a model. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shabier Parker, Jean-Paul Van Belle |
Lifelogging and lifeblogging: Privacy issues and influencing factors in South Africa. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bassey Isong, Naison Gasela, Ifeoma U. Ohaeri, Elegbeleye Femi |
RFID-based design-theoretical framework for combating police impersonation in South Africa. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mostafa Doroudian, Narges Arastouie, Mohammad Talebi, Ali Reza Ghanbarian |
Multilayered database intrusion detection system for detecting malicious behaviors in big data transaction. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | T. Charles, M. Pollock |
Digital forensic investigations at universities in South Africa. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Reema Al Mushcab, Pavel Gladyshev |
The significance of different backup applications in retrieving social networking forensic artifacts from Android-based mobile devices. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Haoua Cheribi, Mohamed-Khireddine Kholladi |
A security model for complex applications based on normative multi-agents system. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zahra Waheed, M. Usman Akram, Amna Waheed, Arslan Shaukat |
Robust extraction of blood vessels for retinal recognition. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fayyaadh Parker, Jacques Ophoff, Jean-Paul Van Belle, Ross Karia |
Security awareness and adoption of security controls by smartphone users. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mvelo Walaza, Marianne Loock, Elmarie Kritzinger |
A pragmatic approach towards the integration of ICT security awareness into the South African education system. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ruilin Zhu, Lech J. Janczewski |
Typology of information systems security research: A methodological perspective. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Najam Dar, M. Usman Akram, Anam Usman, Shoab Ahmad Khan |
ECG biometric identification for general population using multiresolution analysis of DWT based features. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Madiha Tahir, M. Usman Akram |
Online signature verification using hybrid features. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ar Kar Kyaw, Yuzhu Chen, Justin Joseph |
Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Walid Al-Ahmad, Basil Mohammed |
A code of practice for effective information security risk management using COBIT 5. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wenli Shang, Ming Wan, Peng Zeng 0001, Quansheng Qiao |
Research on self-learning method on generation and optimization of industrial firewall rules. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | |
2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015 |
InfoSec |
2015 |
DBLP BibTeX RDF |
|
1 | Nyalleng Moorosi, Vukosi Marivate |
Privacy in mining crime data from social Media: A South African perspective. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lineo Mejaele, Elisha Oketch Ochola |
Analysing the impact of black hole attack on DSR-based MANET: The hidden network destructor. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Antesar M. Shabut, Keshav P. Dahal, Irfan Awan, Zeeshan Pervez |
Route optimasation based on multidimensional trust evaluation model in mobile ad hoc networks. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Sarfraz 0001, Syed M. A. J. Rizvi |
An intelligent system for Online Signature Verification. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Topside E. Mathonsi |
Optimized handoff and secure roaming model for wireless networks. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ar Kar Kyaw, Franco Sioquim, Justin Joseph |
Dictionary attack on Wordpress: Security and forensic analysis. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael Hopkins, Ali Dehghantanha |
Exploit Kits: The production line of the Cybercrime economy? |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Delwar Alam, Touhid Bhuiyan, Md. Alamgir Kabir, Tanjila Farah |
SQLi vulnerabilty in education sector websites of Bangladesh. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Hughes, Adrie Stander, Val A. Hooper |
eDiscovery in South Africa and the challenges it faces. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ileen E. van Vuuren, Elmarie Kritzinger, Conrad Mueller |
Identifying gaps in IT retail Information Security policy implementation processes. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kennedy Njenga, Sifiso Ndlovu |
Mobile banking and information security risks: Demand-side predilections of South African lead-users. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #29 of 29 (100 per page; Change: )
|
|