


default search action
14th ISSA 2015: Johannesburg, South Africa
- Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Stephen Flowerday:

2015 Information Security for South Africa, ISSA 2015, Johannesburg, South Africa, August 12-13, 2015. IEEE 2015, ISBN 978-1-4799-7755-0 - Hein S. Venter

, Marianne Loock, Marijke Coetzee
, Mariki M. Eloff
:
Introduction. 1 - Murdoch Watney

:
State-on-nationals' electronic communication surveillance in South Africa: A murky legal landscape to navigate? 1-6 - Kishor Krishnan Nair, Albert Helberg

, Johan van der Merwe:
Intrusion detection in Bluetooth enabled mobile phones. 1-8 - Dayne Edward Skolmen, Mariana Gerber:

Protection of Personal Information in the South African Cloud Computing environment: A framework for Cloud Computing adoption. 1-10 - Victor R. Kebande

, Hein S. Venter
:
Adding event reconstruction to a Cloud Forensic Readiness model. 1-9 - Karen Renaud

, Andrew Hoskins
, Rossouw von Solms:
Biometric identification: Are we ethically ready? 1-8 - Melissa Ingles, Aleksandar Valjarevic, Hein S. Venter

:
Evaluation and analysis of a software prototype for guidance and implementation of a standardized digital forensic investigation process. 1-8 - Bessy Mahopo, Hanifa Abdullah

, Mathias Mujinga
:
A formal qualitative risk management approach for IT security. 1-8 - Johnny Botha

, Mariki M. Eloff, I. Swart:
The effects of the PoPI Act on small and medium enterprises in South Africa. 1-8 - Suné von Solms:

An investigation into credit card information disclosure through Point of Sale purchases. 1-8 - Brian Greaves, Marijke Coetzee

:
Access control for local personal smart spaces. 1-8 - Roderick Mooi

, Reinhardt A. Botha
:
Prerequisites for building a Computer Security Incident Response capability. 1-8 - T. D. Ramotsoela

, Gerhard P. Hancke
:
Data aggregation using homomorphic encryption in wireless sensor networks. 1-8 - Jaco du Toit

, Ian Ellefsen:
Location aware mobile device management. 1-8 - Jared Naude, Lynette Drevin

:
The adversarial threat posed by the NSA to the integrity of the internet. 1-7 - Reijo M. Savola, Pekka Savolainen

, Antti Evesti, Habtamu Abie, Markus Sihvonen
:
Risk-driven security metrics development for an e-health IoT application. 1-6 - Irene Govender:

Mapping 'Security Safeguard' Requirements in a data privacy legislation to an international privacy framework: A compliance methodology. 1-8 - Jabu Mtsweni:

Analyzing the security posture of South African websites. 1-8 - Keshnee Padayachee

:
A framework of opportunity-reducing techniques to mitigate the insider threat. 1-8 - Heloise Pieterse

, Martin S. Olivier
, Renier P. van Heerden:
Playing hide-and-seek: Detecting the manipulation of Android Timestamps. 1-8 - Peter M. Wrench, Barry V. W. Irwin

:
Towards a PHP webshell taxonomy using deobfuscation-assisted similarity analysis. 1-8 - Thembekile O. Mayayise, Isaac Olusegun Osunmakinde:

Robustness of computational intelligent assurance models when assessing e-Commerce sites. 1-8 - Jason Jordaan, Karen L. Bradshaw:

The current state of digital forensic practitioners in South Africa. 1-9 - Lauren Rudman, Barry V. W. Irwin

:
Characterization and analysis of NTP amplification based DDoS attacks. 1-5 - Paul Muntean

, Mustafizur Rahman, Andreas Ibing, Claudia Eckert:
SMT-constrained symbolic execution engine for integer overflow detection in C code. 1-8 - Werner K. Hauger, Martin S. Olivier

:
The state of database forensic research. 1-8 - Mc Donald Van der Merwe, Wynand J. C. van Staden:

Unsolicited Short Message Service marketing: A preliminary investigation into individual acceptance, perceptions of content, and privacy concerns. 1-7 - Tayana Morkel:

Self-sanitization of digital images using steganography. 1-6 - Luke Lubbe, Martin Oliver:

Beacons and their uses for digital forensics purposes. 1-6 - D. J. E. Masvosvere, Hein S. Venter

:
A model for the design of next generation e-supply chain digital forensic readiness tools. 1-9 - Andrea Herrera, Lech J. Janczewski

:
Cloud supply chain resilience. 1-9 - Martin S. Olivier

:
Towards a digital forensic science. 1-8 - Gregory Stuart Smith, Marijke Coetzee

:
AFA-RFID: Physical layer authentication for passive RFID tags. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














