The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISSA"( http://dblp.L3S.de/Venues/ISSA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/issa

Publication years (Num. hits)
2002 (28) 2003-2004 (36) 2005 (35) 2006 (34) 2008 (25) 2009 (34) 2010 (33) 2011 (40) 2012 (28) 2013 (32) 2014 (33) 2015 (34) 2016 (19) 2017 (15) 2019-2020 (13)
Publication types (Num. hits)
inproceedings(424) proceedings(15)
Venues (Conferences, Journals, ...)
ISSA(439)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 439 publication records. Showing 439 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Anton Borg, Martin Boldt, Niklas Lavesson Informed Software Installation Through License Agreement Categorization. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
1Waldo Delport, Michael Köhn, Martin S. Olivier Isolating a cloud instance for a digital forensic investigation. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
1Franscois Van Staden, Hein S. Venter Adding digital forensic readiness to electronic communication using a security monitoring tool. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
1Marthie Grobler, Zama Dlamini, Sipho Ngobeni, Aubrey Labuschagne Towards a Cyber security aware rural community. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
1Shaun Egan An Evaluation of Lightweight Classification Methods for Identifying Malicious URLs. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
1Rossouw von Solms, Kerry-Lynn Thomson, Mvikeli Maninjwa Information Security Governance control through comprehensive policy architectures. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
1Ka Fai Peter Chan Secret sharing in audio steganography. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
1Endre Bangerter, Stephan Krenn, Matrial Seifriz, Ulrich Ultes-Nitsche cPLC - A Cryptographic Programming Language and Compiler. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
1Rayne Reid, Johan Van Niekerk, Rossouw von Solms Guidelines for the creation of brain compatible cyber security educational material in Moodle 2.0. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
1Hector Beyers, Martin S. Olivier, Gerhard P. Hancke 0001 An approach to examine the Metadata and Data of a database Management System by making use of a forensic comparison tool. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
1Anastassia S. Rakitianskaia, Martin S. Olivier, Antony K. Cooper Nature and Forensic investigation of crime in Second Life. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
1Etienne Stalmans A Framework for DNS based detection and mitigation of malware infections on a network. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
1Anne V. D. M. Kayem, Patrick Martin 0001, Selim G. Akl Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
1Tinus Strauss, Martin S. Olivier Network Forensics in a Clean-Slate Internet Architecture. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
1Karen Renaud, Dora Galvez-Cruz Privacy: Aspects, Definitions and a Multi-Faceted Privacy Preservation Approach. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Ryan G. Goss, Reinhardt A. Botha Deep Packet Inspection - Fear of the Unknown. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Tristan Lavarack, Marijke Coetzee Considering web services security policy compatibility. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Namosha Veerasamy Motivation for Cyberterrorrism. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Anne Kayem On Monitoring Information Flow of Outsourced Data. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Moses Dlamini, Elmarie Venter, Jan H. P. Eloff, Danie Smit Inclusive Information Society - Challenges from a South African Rural Primary Healthcare Perspective. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Oliver Spycher, Rolf Haenni A Novel Protocol to Allow Revocation of Votes in a Hybrid Voting System. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Monique Bezuidenhout, Francois Mouton, Hein S. Venter Social Engineering Attack Detection Model: SEADM. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Greg Megaw, Stephen Flowerday Phishing within E-Commerce: A Trust and Confidence Game. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Marthie Grobler, Joey Jansen van Vuuren Broadband broadens scope for cyber crime in Africa. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Sumant Ramgovind, Mariki M. Eloff, Elme Smith The Management of Cloud Computing Security. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Richard Ssekibuule Secure Publish-Subscribe Mediated Virtual Organizations. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Reijo Savola, Heimo Pentikäinen, Moussa Ouedraogo Towards Security Effectiveness Measurement utilizing Risk-Based Security Assurance. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Michael Kyobe Towards a framework to guide compliance with IS Security policies and Regulations in a university. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Alok Tripathi, Abhinav Mishra, G. V. Raghunathan A Test Bed for Information Security Skill Development with Virtual Training Environment. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Alain Craven, Mariki M. Eloff Biometrics as an Agent to Reduce Fraud in the Micro Lending Industry in South Africa. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Brett van Niekerk, Manoj S. Maharaj Mobile Security from an Information Warfare Perspective. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Mohamed Al Fairuz, Karen Renaud Multi-channel, Multi-level Authentication for More Secure eBanking. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke An investigation and survey of response options for Intrusion Response Systems (IRSs). Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Marthie Grobler Phishing for Fortune. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Jacqui Chetty, Marijke Coetzee Towards an Information Security Framework for Service-Oriented Architecture. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Valiya Gangadharan, Laurette Pretorius Towards an Ethical Analysis of the W3C Web Services Architecture Model. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Himal Lalla, Stephen Flowerday Towards a Standardised Digital Forensic Process: E-mail Forensics. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Francois Ruan Van Staden, Hein S. Venter Adding digital forensic readiness to the email trace header. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Anass Bayaga, Stephen Flowerday A Conceptual Operational Risk Model for SMEs: Impact on Organisational Information Technology. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Ziyad S. Al-Salloum, Stephen D. Wolthusen Agent-Based Host Enumeration and Vulnerability Scanning Using Dynamic Topology Information. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1David Barske, Adrie Stander, Jason Jordaan A Digital Forensic Readiness Framework for South African SME's. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Marthie Grobler, Harri Bryk Common problems faced during the establishment of a CSIRT. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Cornelia Grobler, Buks Louwrens A Digital Evidence Management Plan. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Eugene Smith, Hennie A. Kruger A framework for evaluating IT security investments in a banking environment. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Hendrik Visage, Martin S. Olivier A Generalized model for understanding and education of Information and Computer Security. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Hein S. Venter, Marijke Coetzee, Marianne Loock (eds.) Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings ISSA 2010 Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Mark M. Seeger, Stephen D. Wolthusen, Christoph Busch 0001, Harald Baier The Cost of Observation for Intrusion Detection: Performance Impact of Concurrent Host Observation. Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
1Innocentia Dlamini, Martin S. Olivier The Design of a Logical Traffic Isolation Forensic Model. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Moses Dlamini, Mariki M. Eloff, Jan H. P. Eloff, Karin Höne BC3I - Towards Requirements Specification for Preparing an Information Security Budget. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Geoffrey Karokola, Louise Yngström Discussing E-Government Maturity Models for the Developing World - Security View. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Edwin Donald Frauenstein, Rossouw von Solms Phishing: How an Organization can Protect Itself. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Carolin Latze, Andreas Ruppen, Ulrich Ultes-Nitsche A Proof of Concept Implementation of a Secure E-Commerce Authentication Scheme. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Tristan Lavarack, Marijke Coetzee A Framework for Web Services Security Policy Negotiation. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Kennedy Njenga, Irwin Brown Inductively Deriving an Organisational Information Security Risk Management Agenda by Exploring Process Improvisation. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Erik Hjelmås, Nils Kalstad Svendsen, Stephen D. Wolthusen Integrating Information Security with Information System Architecture and Administration Curricula. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Marthie Grobler, Basie von Solms A Best Practice Approach to Live Forensic Acquisition. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Jacqui Chetty, Marijke Coetzee Evaluating Information Security Controls Applied by Service-Oriented Architecture Governance Frameworks. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1George-Christian Pranschke, Barry Irwin, Richard J. Barnett Automated Firewall Rule Set Generation Through Passive Traffic Inspection. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Rabelani Dagada, Mariki M. Eloff, Lucas M. Venter Too Many Laws But Very Little Progress! Is South African Highly Acclaimed Information Security Legislation Redundant? Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Jeffy Mwakalinga, Stewart Kowalski, Louise Yngström Methodology for Considering Environments and Culture in Developing Information Security Systems. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Reijo Savola Identification of Basic Measurable Security Components in Software-Intensive Systems. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Bradley Cowie, Barry Irwin, Richard J. Barnett Management, Processing and Analysis of Cryptographic Network Protocols. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Marek P. Zielinski, Martin S. Olivier How Appropriate is K-Anonymity for Addressing the Conflict Between Privacy and Information Utility in Microdata ASnonymisation. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Rudi Victor, Andrew Rutherford, Reinhardt A. Botha Enhanced Presence Handling. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Hein S. Venter, Marijke Coetzee, Les Labuschagne (eds.) Information Security South Africa Conference 2009, School of Tourism & Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings ISSA2009 Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Sipho Josia Ngobeni, Marthie Grobler Information Security Policies for Governmental Organisations, The Minimum Criteria. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Sipho Josia Ngobeni, Hein S. Venter The Design of a Wireless Forensic Readiness Model(WFRM). Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Gregory Stuart Smith, Marijke Coetzee An Analysis of Authentication for Passive RFID Tags. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Alastair Nottingham, Barry Irwin Investigating the effect of Genetic Algorithms on Filter Optimisation Within Fast Packet Classifiers. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Adrie Stander, A. Dunnet, J. Rizzo A Survey of Computer Crime and Security in South Africa. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Richard J. Barnett, Barry Irwin A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection Systems. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Christian Schaefer, Thomas Walter 0001, Matús Harvan, Alexander Pretschner Usage Control Policy Enforcement in OpenOffice.org and Information Flow. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Cornelia Grobler, Buks Louwrens High-Level Integrated Vie of Digital Forensics. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Haroon Meer An examination of the Generic Exploit Prevention Mechanisms on Apple's Leopard Operating System. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Arthur Godlstuck, Rabelani Dagada Help Us! We Want to be "E-Secured": Digital Banking Customers' Security Needs in South Africa. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Ryno Boshoff, Johan Van Niekerk E-mail Security awareness at Nelson Mandela Metropolitan University (Registrar's Division). Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Franscois Van Staden, Hein S. Venter The State of the Art of Spam and Anti-Spam Strategies and a Possible Solution using Digital Forensics. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Anna B. Adimo, Fisseha Mekuria Mobile Communications Security Research at CSIR-MDS. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Thomas Monk, Johan Van Niekerk, Rossouw von Solms Concealing the Medicine: Information Security Education through Game Play. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Namosha Veerasamy, Barend Taute An Introduction to Emerging Threats and Vulnerabilities to Create User Awareness. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Ickin Vural, Hein S. Venter Investigating Identity Concealing and Email Tracing Techniques. Search on Bibsonomy ISSA The full citation details ... 2009 DBLP  BibTeX  RDF
1Frankie Tvrz, Marijke Coetzee The Information Security of a Bluetooth-Enabled Handheld Device. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Tony Stephanou, Rabelani Dagada The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further Research. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Tana Pistorius The IP Protection of Electronic Databases: Copyright or Copywrong? Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Christoph Ehret, Ulrich Ultes-Nitsche Immune System Based Intrusion Detection System. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Pontjho Mokhonoana, Martin S. Olivier Application of Message Digests for the Verification of Logical Forensic Data. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Rachid El Khayari, Nicolai Kuntze, Andreas U. Schmidt Spam Over Internet Telephony and How to Deal with it. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Johan Van Niekerk, Rossouw von Solms Bloom's Taxonomy for Information Security Education. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Sri Warna Mahanamahewa Computer Monitoring in the 21st Century Workplace. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Marthie Lessing, Lara Weissenberger No Age Discrimination for Biometrics. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Rasika Dayarathna The Principle of Security Safeguards: Accidental Activities. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Hein S. Venter, Mariki M. Eloff, Jan H. P. Eloff, Les Labuschagne (eds.) Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008 Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Elmarie Biermann, Jan Mentz Emerging Framework for The Evaluation of Open Source Security Tools. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Dawn Medlin Password Management: Empirical Results from a RSA and USA Study. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Johann Amsenga An Introduction to Standards related to Information Security. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Michael Köhn, Jan H. P. Eloff, Martin S. Olivier UML Modelling of Digital Forensic Process Models (DFPMs). Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Geoffrey Karokola, Louise Yngström Lessons Learnt in the Process of Computerization, Automation and Management of ICT Security in the Developing World: A Case Study of The University of Dar Es Salaam, Tanzania. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Matthew Deas, Stephen Flowerday A User Centric Model for Online Identity and Access Management. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Barry Irwin, Blake Friedman Spam Construction Trends. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Carolin Latze, Ulrich Ultes-Nitsche A Proof-of-Concept Implementation of EAP-TLS with TPM Support. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
Displaying result #201 - #300 of 439 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license