


default search action
15th ISSA 2016: Johannesburg, South Africa
- Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff:

2016 Information Security for South Africa, ISSA 2016, Johannesburg, South Africa, August 17-18, 2016. IEEE 2016, ISBN 978-1-5090-2473-5 - Noluvuyo Fani, Rossouw von Solms, Mariana Gerber:

A framework towards governing "Bring Your Own Device in SMMEs". 1-8 - Paulus Swartz

, Adéle da Veiga
:
PoPI Act - opt-in and opt-out compliance from a data value chain perspective: A South African insurance industry experiment. 9-17 - Petrus M. J. Delport

, Mariana Gerber, Nader Sohrabi Safa
:
An interactive visual library model to improve awareness in handling of business information. 18-26 - Ryan De Kock, Lynn Ann Futcher:

Mobile device usage in higher education institutions in South Africa. 27-34 - Yusuf Moosa Motara

, Barry Irwin
:
SHA-1 and the Strict Avalanche Criterion. 35-40 - J. N. Samuel, Warren P. Du Plessis

:
Specific emitter identification for enhanced access control security. 41-47 - Nicholas Scharnick, Mariana Gerber, Lynn Futcher:

Review of data storage protection approaches for POPI compliance. 48-55 - Olanrewaju B. Wojuola, Stanley H. Mneney, Viranjay M. Srivastava

:
CDMA in signal encryption and information security. 56-61 - Lineo Mejaele, Elisha Oketch Ochola

:
Effect of varying node mobility in the analysis of black hole attack on MANET reactive routing protocols. 62-68 - Johannes S. Vorster, Renier P. van Heerden, Barry Irwin

:
The pattern-richness of Graphical passwords. 69-76 - Lauren Rudman, Barry Irwin

:
Dridex: Analysis of the traffic and automatic generation of IOCs. 77-84 - Mfundo Glenn Masango, Francois Mouton, Alastair Nottingham, Jabu Mtsweni:

Context Aware Mobile Application for mobile devices. 85-90 - Wynand J. C. van Staden, Etienne van der Poel

:
Team formation in digital forensics. 91-97 - Edwin Donald Frauenstein

, Stephen V. Flowerday
:
Social network phishing: Becoming habituated to clicks and ignorant to threats? 98-105 - Othoman Elaswad, Christian Damsgaard Jensen

:
Identity management for e-government Libya as a case study. 106-113 - Chollette C. Olisah, Peter Ogedebe:

Recognizing surgically altered faces using local edge gradient Gabor magnitude pattern. 114-120 - Alan Herbert, Barry Irwin

:
Adaptable exploit detection through scalable NetFlow analysis. 121-128 - Patrick Monamo, Vukosi Marivate

, Bheki Twala
:
Unsupervised learning for robust Bitcoin fraud detection. 129-134

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














