The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISSA"( http://dblp.L3S.de/Venues/ISSA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/issa

Publication years (Num. hits)
2002 (28) 2003-2004 (36) 2005 (35) 2006 (34) 2008 (25) 2009 (34) 2010 (33) 2011 (40) 2012 (28) 2013 (32) 2014 (33) 2015 (34) 2016 (19) 2017 (15) 2019-2020 (13)
Publication types (Num. hits)
inproceedings(424) proceedings(15)
Venues (Conferences, Journals, ...)
ISSA(439)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 439 publication records. Showing 439 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff (eds.) Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings Search on Bibsonomy ISSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Abdramane Bah, Pascal André, J. Christian Attiogbé, Jacqueline Konaté Federation of Services from Autonomous Domains with Heterogeneous Access Control Models. Search on Bibsonomy ISSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Anthony Bolton, Leila Goosen, Elmarie Kritzinger Security Aspects of an Empirical Study into the Impact of Digital Transformation via Unified Communication and Collaboration Technologies on the Productivity and Innovation of a Global Automotive Enterprise. Search on Bibsonomy ISSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Indren Govender, Bruce Watson Theorising Information Security Policy Violations. Search on Bibsonomy ISSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kenneth Ayong, Rennie Naidoo An Institutional Trust Perspective of Cloud Adoption Among SMEs in South Africa. Search on Bibsonomy ISSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Lelethu Zazaza, H. S. Venter, George Sibiya A Conceptual Model for Consent Management in South African e-Health Systems for Privacy Preservation. Search on Bibsonomy ISSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Dirk Snyman, Hennie A. Kruger A Management Decision Support System for Evaluating Information Security Behaviour. Search on Bibsonomy ISSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Faith Lekota, Marijke Coetzee An Aviation Sector CSIRT for Sub-Saharan Africa. Search on Bibsonomy ISSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sunthoshan G. Govender, Elmarie Kritzinger, Marianne Loock Information Security Cost Reduction Through Social Means. Search on Bibsonomy ISSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ntsako Baloyi, Paula Kotzé Data Privacy Compliance Benefits for Organisations - A Cyber-Physical Systems and Internet of Things Study. Search on Bibsonomy ISSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Gershon Hutchinson, Jacques Ophoff A Descriptive Review and Classification of Organizational Information Security Awareness Research. Search on Bibsonomy ISSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jaco du Toit PAUDIT: A Distributed Data Architecture for Fitness Data. Search on Bibsonomy ISSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sophia Moganedi, Dalenca Pottas Threats and Vulnerabilities Affecting Fitness Wearables: Security and Privacy Theoretical Analysis. Search on Bibsonomy ISSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Javan Mnjama, Greg Foster, Barry Irwin A privacy and security threat assessment framework for consumer health wearables. Search on Bibsonomy ISSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Werner K. Hauger, Martin S. Olivier Forensic attribution in NoSQL databases. Search on Bibsonomy ISSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ambrosio Patricio Vumo, Josef Spillner, Stefan Köpsell Analysis of Mozambican websites: How do they protect their users? Search on Bibsonomy ISSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff (eds.) 2017 Information Security for South Africa, ISSA 2017, Johannesburg, South Africa, August 16-17, 2017 Search on Bibsonomy ISSA The full citation details ... 2017 DBLP  BibTeX  RDF
1Mohammad Aldabbas, Stephanie Teufel, Bernd Teufel The importance of security culture for crowd energy systems. Search on Bibsonomy ISSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sean Pennefather, Barry Irwin Design and application of link: A DSL for network frame manipulation. Search on Bibsonomy ISSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sarathiel Chaipa, Mariki M. Eloff Towards the development of an effective intrusion detection model. Search on Bibsonomy ISSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Adéle da Veiga, Ruthea Vorster, Colin Pilkington, Hanifa Abdullah Compliance with the protection of personal information act and consumer privacy expectations: A comparison between the retail and medical aid industry. Search on Bibsonomy ISSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Francois Mouton, Alastair Nottingham, Louise Leenen, H. S. Venter Underlying finite state machine for the social engineering attack detection model. Search on Bibsonomy ISSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Francois Mouton, Marcel Teixeira, Thomas Meyer 0002 Benchmarking a mobile implementation of the social engineering prevention training tool. Search on Bibsonomy ISSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nkosinathi Mpofu, Wynand J. C. van Staden Evaluating the severity of trust to identity- management-as-a-service. Search on Bibsonomy ISSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ibraheem Frieslaar, Barry Irwin Investigating the electromagnetic side channel leakage from a Raspberry Pi. Search on Bibsonomy ISSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Karen Renaud, Verena Zimmermann Enriched nudges lead to stronger password replacements ... but implement mindfully. Search on Bibsonomy ISSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1David Kenyon, Jan H. P. Eloff Big data science for predicting insurance claims fraud. Search on Bibsonomy ISSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marc Pelteret, Jacques Ophoff Organizational information privacy strategy and the impact of the PoPI act. Search on Bibsonomy ISSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lineo Mejaele, Elisha Oketch Ochola Effect of varying node mobility in the analysis of black hole attack on MANET reactive routing protocols. Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Petrus M. J. Delport, Mariana Gerber, Nader Sohrabi Safa An interactive visual library model to improve awareness in handling of business information. Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wynand J. C. van Staden, Etienne van der Poel Team formation in digital forensics. Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chollette C. Olisah, Peter Ogedebe Recognizing surgically altered faces using local edge gradient Gabor magnitude pattern. Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1J. N. Samuel, Warren P. Du Plessis Specific emitter identification for enhanced access control security. Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yusuf Moosa Motara, Barry Irwin SHA-1 and the Strict Avalanche Criterion. Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nicholas Scharnick, Mariana Gerber, Lynn Futcher Review of data storage protection approaches for POPI compliance. Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mfundo Glenn Masango, Francois Mouton, Alastair Nottingham, Jabu Mtsweni Context Aware Mobile Application for mobile devices. Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Noluvuyo Fani, Rossouw von Solms, Mariana Gerber A framework towards governing "Bring Your Own Device in SMMEs". Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Othoman Elaswad, Christian Damsgaard Jensen Identity management for e-government Libya as a case study. Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Paulus Swartz, Adéle da Veiga PoPI Act - opt-in and opt-out compliance from a data value chain perspective: A South African insurance industry experiment. Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Johannes S. Vorster, Renier P. van Heerden, Barry Irwin The pattern-richness of Graphical passwords. Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alan Herbert, Barry Irwin Adaptable exploit detection through scalable NetFlow analysis. Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ryan De Kock, Lynn Ann Futcher Mobile device usage in higher education institutions in South Africa. Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lauren Rudman, Barry Irwin Dridex: Analysis of the traffic and automatic generation of IOCs. Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff (eds.) 2016 Information Security for South Africa, ISSA 2016, Johannesburg, South Africa, August 17-18, 2016 Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  BibTeX  RDF
1Olanrewaju B. Wojuola, Stanley H. Mneney, Viranjay M. Srivastava CDMA in signal encryption and information security. Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Patrick Monamo, Vukosi Marivate, Bheki Twala Unsupervised learning for robust Bitcoin fraud detection. Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Edwin Donald Frauenstein, Stephen V. Flowerday Social network phishing: Becoming habituated to clicks and ignorant to threats? Search on Bibsonomy ISSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Irene Govender Mapping 'Security Safeguard' Requirements in a data privacy legislation to an international privacy framework: A compliance methodology. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Melissa Ingles, Aleksandar Valjarevic, Hein S. Venter Evaluation and analysis of a software prototype for guidance and implementation of a standardized digital forensic investigation process. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jaco du Toit, Ian Ellefsen Location aware mobile device management. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Murdoch Watney State-on-nationals' electronic communication surveillance in South Africa: A murky legal landscape to navigate? Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Peter M. Wrench, Barry V. W. Irwin Towards a PHP webshell taxonomy using deobfuscation-assisted similarity analysis. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tayana Morkel Self-sanitization of digital images using steganography. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Thembekile O. Mayayise, Isaac Olusegun Osunmakinde Robustness of computational intelligent assurance models when assessing e-Commerce sites. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1T. D. Ramotsoela 0001, Gerhard P. Hancke 0002 Data aggregation using homomorphic encryption in wireless sensor networks. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jabu Mtsweni Analyzing the security posture of South African websites. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Karen Renaud, Andrew Hoskins, Rossouw von Solms Biometric identification: Are we ethically ready? Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Werner K. Hauger, Martin S. Olivier The state of database forensic research. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Suné von Solms An investigation into credit card information disclosure through Point of Sale purchases. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Martin S. Olivier Towards a digital forensic science. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1D. J. E. Masvosvere, Hein S. Venter A model for the design of next generation e-supply chain digital forensic readiness tools. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Paul Muntean, Mustafizur Rahman, Andreas Ibing, Claudia Eckert 0001 SMT-constrained symbolic execution engine for integer overflow detection in C code. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kishor Krishnan Nair, Albert Helberg, Johan Van Der Merwe Intrusion detection in Bluetooth enabled mobile phones. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff Introduction. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dayne Edward Skolmen, Mariana Gerber Protection of Personal Information in the South African Cloud Computing environment: A framework for Cloud Computing adoption. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Keshnee Padayachee A framework of opportunity-reducing techniques to mitigate the insider threat. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Brian Greaves, Marijke Coetzee Access control for local personal smart spaces. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Stephen Flowerday (eds.) 2015 Information Security for South Africa, ISSA 2015, Johannesburg, South Africa, August 12-13, 2015 Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  BibTeX  RDF
1Jason Jordaan, Karen L. Bradshaw The current state of digital forensic practitioners in South Africa. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jared Naude, Lynette Drevin The adversarial threat posed by the NSA to the integrity of the internet. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lauren Rudman, Barry V. W. Irwin Characterization and analysis of NTP amplification based DDoS attacks. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Reijo M. Savola, Pekka Savolainen, Antti Evesti, Habtamu Abie, Markus Sihvonen Risk-driven security metrics development for an e-health IoT application. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Heloise Pieterse, Martin S. Olivier, Renier P. van Heerden Playing hide-and-seek: Detecting the manipulation of Android Timestamps. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gregory Stuart Smith, Marijke Coetzee AFA-RFID: Physical layer authentication for passive RFID tags. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Luke Lubbe, Martin Oliver Beacons and their uses for digital forensics purposes. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Andrea Herrera, Lech J. Janczewski Cloud supply chain resilience. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Victor R. Kebande, Hein S. Venter Adding event reconstruction to a Cloud Forensic Readiness model. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bessy Mahopo, Hanifa Abdullah, Mathias Mujinga A formal qualitative risk management approach for IT security. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Roderick Mooi, Reinhardt A. Botha Prerequisites for building a Computer Security Incident Response capability. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1J. G. Botha, Mariki M. Eloff, I. Swart The effects of the PoPI Act on small and medium enterprises in South Africa. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mc Donald Van der Merwe, Wynand J. C. van Staden Unsolicited Short Message Service marketing: A preliminary investigation into individual acceptance, perceptions of content, and privacy concerns. Search on Bibsonomy ISSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pierre Schnarz, Clemens Fischer, Joachim Wietzke, Ingo Stengel On a domain block based mechanism to mitigate DoS attacks on shared caches in asymmetric multiprocessing multi operating systems. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rayne Reid, Johan Van Niekerk From information security to cyber security cultures. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zubeida Casmod Khan, Thulani Mashiane An analysis of Facebook's graph search. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jacques Coertze, Rossouw von Solms The murky waters of IT governance. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Peter M. Wrench, Barry Irwin Towards a sandbox for the deobfuscation and dissection of PHP malware. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Warren P. Du Plessis Software-defined radio (SDR) as a mechanism for exploring cyber-electronic warfare (EW) collaboration. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Philip M. Trenwith, Hein S. Venter A digital forensic model for providing better data provenance in the cloud. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nkosinathi Mpofu, Wynand J. C. van Staden A survey of trust issues constraining the growth of Identity Management-as-a-Service(IdMaaS). Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Werner K. Hauger, Martin S. Olivier The role of triggers in database forensics. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Reijo M. Savola, Markku Kylänpää Security objectives, controls and metrics development for an Android smartphone application. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rayne Reid, Johan Van Niekerk, Karen Renaud Information security culture: A general living systems theory perspective. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Emilio Raymond Mumba, Hein S. Venter Mobile forensics using the harmonised digital forensic investigation process. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nicolai Kuntze, Carsten Rudolph, Oliver Hanka Security foundation for a distributed cabin core architecture. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ignus P. Swart, Barry Irwin, Marthie Grobler Towards a platform to visualize the state of South Africa's information security. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kudakwashe Madzima, Moses Moyo, Hanifa Abdullah Is bring your own device an institutional information security risk for small-scale business organisations? Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Abdul Mirza, Makhamisa Senekane, Francesco Petruccione, Brett van Niekerk Suitability of quantum cryptography for national facilities. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sean Pennefather, Barry Irwin An exploration of geolocation and traffic visualisation using network flows. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wynand J. C. van Staden An investigation into reducing third party privacy breaches during the investigation of cybercrime. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jaco Robertson Integrity of a common operating picture in military situational awareness. Search on Bibsonomy ISSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 439 (100 per page; Change: )
Pages: [1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license