


default search action
8th ISSA 2009: Johannesburg, South Africa
- Hein S. Venter, Marijke Coetzee, Les Labuschagne:

Information Security South Africa Conference 2009, School of Tourism & Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings ISSA2009. ISSA, Pretoria, South Africa 2009, ISBN 978-1-86854-740-1
Reviewed Research Papers
- Marthie Grobler, Basie von Solms:

A Best Practice Approach to Live Forensic Acquisition. 3-13 - Cornelia Grobler, Buks Louwrens:

High-Level Integrated Vie of Digital Forensics. 15-34 - Sipho Josia Ngobeni, Hein S. Venter:

The Design of a Wireless Forensic Readiness Model(WFRM). 35-52 - Moses Dlamini, Mariki M. Eloff, Jan H. P. Eloff, Karin Höne:

BC3I - Towards Requirements Specification for Preparing an Information Security Budget. 53-68 - Reijo Savola:

Identification of Basic Measurable Security Components in Software-Intensive Systems. 69-80 - Geoffrey Karokola, Louise Yngström:

Discussing E-Government Maturity Models for the Developing World - Security View. 81-98 - Alastair Nottingham, Barry Irwin:

Investigating the effect of Genetic Algorithms on Filter Optimisation Within Fast Packet Classifiers. 99-116 - Arthur Godlstuck, Rabelani Dagada:

Help Us! We Want to be "E-Secured": Digital Banking Customers' Security Needs in South Africa. 117-136 - Haroon Meer:

An examination of the Generic Exploit Prevention Mechanisms on Apple's Leopard Operating System. 137-152 - Tristan Lavarack, Marijke Coetzee:

A Framework for Web Services Security Policy Negotiation. 153-170 - Marek P. Zielinski, Martin S. Olivier:

How Appropriate is K-Anonymity for Addressing the Conflict Between Privacy and Information Utility in Microdata ASnonymisation. 171-188 - Gregory Stuart Smith, Marijke Coetzee:

An Analysis of Authentication for Passive RFID Tags. 189-204 - Namosha Veerasamy, Barend Taute:

An Introduction to Emerging Threats and Vulnerabilities to Create User Awareness. 205-216 - Adrie Stander, A. Dunnet, J. Rizzo:

A Survey of Computer Crime and Security in South Africa. 217-226 - Jacqui Chetty, Marijke Coetzee:

Evaluating Information Security Controls Applied by Service-Oriented Architecture Governance Frameworks. 227-242 - George-Christian Pranschke, Barry Irwin, Richard J. Barnett:

Automated Firewall Rule Set Generation Through Passive Traffic Inspection. 243-252 - Edwin Donald Frauenstein, Rossouw von Solms:

Phishing: How an Organization can Protect Itself. 253-268 - Richard J. Barnett, Barry Irwin:

A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection Systems. 269-278 - Ryno Boshoff, Johan Van Niekerk:

E-mail Security awareness at Nelson Mandela Metropolitan University (Registrar's Division). 279-292 - Ickin Vural, Hein S. Venter:

Investigating Identity Concealing and Email Tracing Techniques. 293-308 - Rudi Victor, Andrew Rutherford, Reinhardt A. Botha:

Enhanced Presence Handling. 309-326 - Rabelani Dagada, Mariki M. Eloff, Lucas M. Venter:

Too Many Laws But Very Little Progress! Is South African Highly Acclaimed Information Security Legislation Redundant? 327-346 - Kennedy Njenga, Irwin Brown:

Inductively Deriving an Organisational Information Security Risk Management Agenda by Exploring Process Improvisation. 347-362 - Erik Hjelmås, Nils Kalstad Svendsen, Stephen D. Wolthusen:

Integrating Information Security with Information System Architecture and Administration Curricula. 363-376
Research in Progress Papers
- Carolin Latze, Andreas Ruppen, Ulrich Ultes-Nitsche:

A Proof of Concept Implementation of a Secure E-Commerce Authentication Scheme. 379-392 - Christian Schaefer, Thomas Walter, Matús Harvan, Alexander Pretschner:

Usage Control Policy Enforcement in OpenOffice.org and Information Flow. 393-406 - Innocentia Dlamini, Martin S. Olivier:

The Design of a Logical Traffic Isolation Forensic Model. 407-418 - Jeffy Mwakalinga, Stewart Kowalski, Louise Yngström:

Methodology for Considering Environments and Culture in Developing Information Security Systems. 419-436 - Franscois Van Staden, Hein S. Venter:

The State of the Art of Spam and Anti-Spam Strategies and a Possible Solution using Digital Forensics. 437-454 - Sipho Josia Ngobeni, Marthie Grobler:

Information Security Policies for Governmental Organisations, The Minimum Criteria. 455-466 - Thomas Monk, Johan Van Niekerk, Rossouw von Solms:

Concealing the Medicine: Information Security Education through Game Play. 467-478 - Bradley Cowie, Barry Irwin, Richard J. Barnett:

Management, Processing and Analysis of Cryptographic Network Protocols. 479-488 - Anna B. Adimo, Fisseha Mekuria:

Mobile Communications Security Research at CSIR-MDS. 489-490

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














