The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "InfoSec"( http://dblp.L3S.de/Venues/InfoSec )

URL (DBLP): http://dblp.uni-trier.de/db/conf/infosec

Publication years (Num. hits)
2015 (29)
Publication types (Num. hits)
inproceedings(28) proceedings(1)
Venues (Conferences, Journals, ...)
InfoSec(29)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 29 publication records. Showing 29 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mustafa Hassan Saad, Ahmed Serageldin, Goda Ismaeel Salama Android spyware disease and medication. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Eric Amankwa, Marianne Loock, Elmarie Kritzinger Enhancing information security education and awareness: Proposed characteristics for a model. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shabier Parker, Jean-Paul Van Belle Lifelogging and lifeblogging: Privacy issues and influencing factors in South Africa. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bassey Isong, Naison Gasela, Ifeoma U. Ohaeri, Elegbeleye Femi RFID-based design-theoretical framework for combating police impersonation in South Africa. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mostafa Doroudian, Narges Arastouie, Mohammad Talebi, Ali Reza Ghanbarian Multilayered database intrusion detection system for detecting malicious behaviors in big data transaction. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1T. Charles, M. Pollock Digital forensic investigations at universities in South Africa. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Reema Al Mushcab, Pavel Gladyshev The significance of different backup applications in retrieving social networking forensic artifacts from Android-based mobile devices. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Haoua Cheribi, Mohamed-Khireddine Kholladi A security model for complex applications based on normative multi-agents system. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zahra Waheed, M. Usman Akram, Amna Waheed, Arslan Shaukat Robust extraction of blood vessels for retinal recognition. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fayyaadh Parker, Jacques Ophoff, Jean-Paul Van Belle, Ross Karia Security awareness and adoption of security controls by smartphone users. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mvelo Walaza, Marianne Loock, Elmarie Kritzinger A pragmatic approach towards the integration of ICT security awareness into the South African education system. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ruilin Zhu, Lech J. Janczewski Typology of information systems security research: A methodological perspective. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Muhammad Najam Dar, M. Usman Akram, Anam Usman, Shoab Ahmad Khan ECG biometric identification for general population using multiresolution analysis of DWT based features. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Madiha Tahir, M. Usman Akram Online signature verification using hybrid features. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ar Kar Kyaw, Yuzhu Chen, Justin Joseph Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Walid Al-Ahmad, Basil Mohammed A code of practice for effective information security risk management using COBIT 5. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wenli Shang, Ming Wan, Peng Zeng 0001, Quansheng Qiao Research on self-learning method on generation and optimization of industrial firewall rules. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1 2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015 Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  BibTeX  RDF
1Nyalleng Moorosi, Vukosi Marivate Privacy in mining crime data from social Media: A South African perspective. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lineo Mejaele, Elisha Oketch Ochola Analysing the impact of black hole attack on DSR-based MANET: The hidden network destructor. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Antesar M. Shabut, Keshav P. Dahal, Irfan Awan, Zeeshan Pervez Route optimasation based on multidimensional trust evaluation model in mobile ad hoc networks. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Muhammad Sarfraz 0001, Syed M. A. J. Rizvi An intelligent system for Online Signature Verification. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Topside E. Mathonsi Optimized handoff and secure roaming model for wireless networks. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ar Kar Kyaw, Franco Sioquim, Justin Joseph Dictionary attack on Wordpress: Security and forensic analysis. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael Hopkins, Ali Dehghantanha Exploit Kits: The production line of the Cybercrime economy? Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Delwar Alam, Touhid Bhuiyan, Md. Alamgir Kabir, Tanjila Farah SQLi vulnerabilty in education sector websites of Bangladesh. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kevin Hughes, Adrie Stander, Val A. Hooper eDiscovery in South Africa and the challenges it faces. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ileen E. van Vuuren, Elmarie Kritzinger, Conrad Mueller Identifying gaps in IT retail Information Security policy implementation processes. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kennedy Njenga, Sifiso Ndlovu Mobile banking and information security risks: Demand-side predilections of South African lead-users. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #29 of 29 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license