![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
12th ISSA 2013: Johannesburg, South Africa
- Hein S. Venter, Marianne Loock, Marijke Coetzee:
2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013. IEEE 2013, ISBN 978-1-4799-0808-0 - George Sibiya
, Thomas Fogwill
, Hein S. Venter
:
Selection and ranking of remote hosts for digital forensic investigation in a Cloud environment. 1-5 - Moses Moyo, Hanifa Abdullah
, Rita C. Nienaber:
Information security risk management in small-scale organisations: A case study of secondary schools computerised information systems. 1-6 - Jean Mouton, Ian Ellefsen:
The identification of information sources to aid with Critical Information Infrastructure Protection. 1-8 - Philip M. Trenwith, Hein S. Venter
:
Digital forensic readiness in the cloud. 1-5 - Karen Renaud, Demetris Kennes, Johan Van Niekerk, Joe Maguire
:
SNIPPET: Genuine knowledge-based authentication. 1-8 - Stacey Omeleze
, Hein S. Venter
:
Testing the harmonised digital forensic investigation process model-using an Android mobile phone. 1-8 - Nickson M. Karie
, Hein S. Venter
:
Towards a framework for enhancing potential digital evidence presentation. 1-8 - Alastair Nottingham, Barry Irwin
:
A high-level architecture for efficient packet trace analysis on GPU co-processors. 1-8 - Abdulrahman Al-Mutairi, Stephen D. Wolthusen:
An analysis of service degradation attacks against real-time MPLS networks. 1-8 - Thembekile O. Mayayise, Isaac Olusegun Osunmakinde
:
A compliant assurance model for assessing the trustworthiness of cloud-based e-commerce systems. 1-8 - Alan Herbert, Barry Irwin
:
A kernel-driven framework for high performance internet routing simulation. 1-6 - M. Al Fahdi, Nathan L. Clarke
, Steven M. Furnell
:
Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions. 1-8 - Aleksandar Valjarevic, Hein S. Venter
:
Implementation guidelines for a harmonised digital forensic investigation readiness process model. 1-9 - Jacques Coertze, Rossouw von Solms:
A software gateway to affordable and effective Information Security Governance in SMMEs. 1-8 - Reijo M. Savola, Teemu Väisänen, Antti Evesti, Pekka Savolainen
, Juha Kemppainen, Marko Kokemaki:
Toward risk-driven security measurement for Android smartphone platforms. 1-8 - Keshnee Padayachee
:
A conceptual opportunity-based framework to mitigate the insider threat. 1-8 - Francois Mouton
, Mercia M. Malan, Hein S. Venter
:
Social engineering from a normative ethics perspective. 1-8 - Heloise Pieterse, Martin S. Olivier
:
Security steps for smartphone users. 1-6 - Omobayo A. Esan, Seleman M. Ngwira, Isaac Olusegun Osunmakinde
:
Bimodal biometrics for financial infrastructure security. 1-8 - Ignus P. Swart, Marthie Grobler
, Barry Irwin
:
Visualization of a data leak. 1-8 - Adam Schoeman:
Amber: A zero-interaction honeypot and network enforcer with modular intelligence. 1-7 - Channel Hillebrand, Marijke Coetzee
:
Towards Reputation-as-a-Service. 1-8 - Elisha O. Ochola
, Mariki M. Eloff
, John A. van der Poll:
Democratic detection of malicious behaviour in MANET: A voting process. 1-7 - Samuel Oswald Hunter, Barry Irwin
, Etienne Stalmans:
Real-time distributed malicious traffic monitoring for honeypots and network telescopes. 1-9 - Fungai Bhunu Shava
, Darelle van Greunen:
Factors affecting user experience with security features: A case study of an academic institution in Namibia. 1-8 - Pierre Jacobs, Alapan Arnab, Barry Irwin
:
Classification of Security Operation Centers. 1-7 - Helen van de Haar, Darelle van Greunen, Dalenca Pottas
:
The characteristics of a biometric. 1-8 - Hein S. Venter
, Marianne Loock
, Marijke Coetzee
:
Introduction. 1 - Lucky Nkosi, Paul Tarwireyi
, Matthew O. Adigun
:
Insider threat detection model for the cloud. 1-8 - Peter Weston, Stephen D. Wolthusen:
Forensic entropy analysis of microsoft windows storage volumes. 1-7 - Sébastien Salva, Stassia R. Zafimiharisoa:
Data vulnerability detection by security testing for Android applications. 1-8
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.