The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISSA"( http://dblp.L3S.de/Venues/ISSA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/issa

Publication years (Num. hits)
2002 (28) 2003-2004 (36) 2005 (35) 2006 (34) 2008 (25) 2009 (34) 2010 (33) 2011 (40) 2012 (28) 2013 (32) 2014 (33) 2015 (34) 2016 (19) 2017 (15) 2019-2020 (13)
Publication types (Num. hits)
inproceedings(424) proceedings(15)
Venues (Conferences, Journals, ...)
ISSA(439)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 439 publication records. Showing 439 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Reijo Savola A Novel Security Metrics Taxonomy for R&D Organisations. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Leonard Shand, Theodore Tryfonas A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Kennedy Njenga, Irwin Brown Collective Improvisation: Complementing Information Security Frameworks with Self-Policing. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Namosha Veerasamy, Jan H. P. Eloff Towards a Framework for a Network Warfare Capability. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Renico Koen, Martin S. Olivier The Use of File Timestamps in Digital Forensics. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Evangelos D. Frangopoulos, Mariki M. Eloff, Lucas M. Venter Social Aspects of Information Security. Search on Bibsonomy ISSA The full citation details ... 2008 DBLP  BibTeX  RDF
1Alapan Arnab, Andrew Hutchison Ticket Based Identity System for DRM. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Kennedy Nduati Njenga, Irwin Brown Conceptualising the Influence of Tacit Knowledge in Security Risk Management Activities. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Nicolai Kuntze, Andreas U. Schmidt Trusted Computing in Mobile Action. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Reijo Savola Towards Security Evaluation based on Evidence Collection. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Jeffy Mwakalinga, Louise Yngström Framework for Securing Mobile Software Agents. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Charles N. Tarimo, Jabiri Kuwe Bakari, Louise Yngström, Stewart Kowalski A Social-Technical View of ICT Security Issues, Trends, and Challenges: Towards a Culture of ICT Security - The Case of Tanzania. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Wesley Brandi, Martin S. Olivier On bidder zones, cell phones and ballot stuffing. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Frank Innerhofer-Oberperfler, Ruth Breu Using an Enterprise Architecture for IT Risk Management. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Dirk Willie du Preez, Vreda Pieterse Calculating Compliance Standards. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Alf Zugenmaier, Anand R. Prasad, Julien Laganier Performance Analysis of a Secure Seamless Handover Mechanism in All-IP Networks. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Liesl van Niekerk, Les Labuschagne The Peculium Model: Information Security Risk Management for the South African SMME. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Kate Ormiston, Mariki M. Eloff Denial-of-Service & Distributed Denial-of-Service on The Internet. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Bradley Clayton, Barry Irwin, Alfredo Terzoli Integrating Secure RTP into the Open Source VoIP PBX Asterisk. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Jacobus A. Ophoff, Stephen Perelson, Reinhardt A. Botha A Model for Secure Value-Added Service Subscriptions in Cellular Networks. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Johan Van Niekerk, Rossouw von Solms Understanding Information Security Culture: A Conceptual Framework. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Leonie McManus, Jan H. P. Eloff Using IT Benchmarking Principles to Design an Information Security Benchmark Model. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Verine Etsebeth Information Security Policies - The Legal Risk of Uninformed Personnel. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Murdoch Watney Justifiability of State Surveillance of the Internet as E-Security Mechanism. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Abdullah Haroon Rasheed, Muhammad Essam, Umair Khalid, Shoab Ahmed Khan, Sheikh Muhammad Farhan A Low Bit Architecture for a Very Compact Hardware Implementation of the AES Algorithm. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Mkhululi Tyukala, Dalenca Pottas, Rossouw von Solms, Helen van de Haar The Organisational Information Security Profile - A Tool to Assist The Board. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Jean-Pierre van Riel, Barry Irwin Identifying and Investigating Intrusive Scanning Patterns by Visualizing Network Telescope Traffic in a 3-D Scatter-plot. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Mark Branagan, Robert Dawson, Dennis Longley Security Risk Analysis for Complex Systems. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Torsten Braun, Christoph Graf, Ulrich Ultes-Nitsche, Aurelius Baier, Thomas Bernoulli Case Study of the Usage of an Authentication and Authorization Infrastructure (AAI) in an E-Learning Project. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Neil J. Croft, Martin S. Olivier Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Dominic White, Barry Irwin Monthly Patch Release Schedules: Do the Benefits Outweigh the Risks? Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Jabiri Kuwe Bakari, Christer Magnusson, Charles N. Tarimo, Louise Yngström Outsourcing ICT Security to MSSP: Issues and Challenges for The Developing World. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Fred Otten, Barry Irwin, Hannah Slay The Need for Centralised, Cross Platform Information Aggregation. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Rabbie Maphakela, Dalenca Pottas Towards Regulatory Compliance - A model for the South African Financial Sector. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Michael Köhn, Martin S. Olivier, Jan H. P. Eloff Framework for a Digital Forensic Investigation. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Demetrios Loutsios, Maree Pather A Brokered Approach to Interoperable Security in OGSA-Based Grid Systems. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter (eds.) Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Hennie A. Kruger, Lynette Drevin, Tjaart Steyn A Framework for Evaluating ICT Security Awareness. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Andreas U. Schmidt, Jan Piechalski Authorised Translations of Electronic Documents. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Thomas McDonald van der Merwe A Profile of The Distance Computing Student Softlifter. Search on Bibsonomy ISSA The full citation details ... 2006 DBLP  BibTeX  RDF
1Vafa D. Izadinia, Jan H. P. Eloff, Derrick G. Kourie Foiling an Attack - Defeating IPSec Tunnel Fingerprinting. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Carl Marnewick, Les Labuschagne A security framework for an ERP system. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter (eds.) Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Tite Tuyikeze, Dalenca Pottas Information Security Management and Regulatory Compliance in the South African Health Sector. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Evangelos D. Frangopoulos, Lucas M. Venter, Mariki M. Eloff Secure Authentication combined with Anonymity: The end of an oxymoron? Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Marijke Coetzee, Jan H. P. Eloff Metadata for trust in service-oriented architectures. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Jeffy Mwakalinga, Louise Yngström Sketch of a generic security framework based on the paradigms of systemic-holistic approach and the immune system. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Werner Bornman, Les Labuschagne A Framework for Information Security Risk Management Communication. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Alapan Arnab, Andrew Hutchison Requirement Analysis of Enterprise DRM Systems. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Eduardo Da Cruz, Les Labuschagne A new framework for bridging the gap between IT Service Management and IT Governance from a security perspective. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Norman Tinyiko Baloyi Analysis of the financial institutions' strategic e-business security solutions: Technical and non-Technical. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Job Asheri Chaula, Louise Yngström, Stewart Kowalski A Framework for Evaluation of Information Systems Security. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Jacobus A. Ophoff, Reinhardt A. Botha Revisiting Reachability Management as a Multilateral Security Mechanism. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1R. Mulder, Rossouw von Solms The Proliferation of Wireless Devices and its Role in Corporate Governance. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Shingo Okamura, Maki Yoshida, Toru Fujiwara Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Charles N. Tarimo, Louise Yngström, Stewart Kowalski An approach to enhance the security of ICT infrastructure through legal, regulatory influences. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Marco Slaviero, Jaco Kroon, Martin S. Olivier Attacking Signed Binaries. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Fabio Ghioni Invasion of the RFIDs: are we heading towards "Modern Times"? Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1M. Jansen Access to copyrighted work: right or privelege? Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Maree Pather, L. M. Venter Securing SOAP Messages with a Global Message Handler and a Standardized Envelope. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Russell Cloran, Barry Irwin Trust on the Web. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Thomas Schlienger, Stephanie Teufel, Raphael Rues Information Security Culture - Status Quo in Switzerland. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Johan Van Niekerk, Rossouw von Solms A holistic framework for the fostering of an information security sub-culture in organizations. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Tayana Morkel, Jan H. P. Eloff, Martin S. Olivier An overview of image steganography. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Johann Hershensohn IT Forensics: the collection of and presentation of digital evidence. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1S. A. Mlangeni, E. Biermann An assessment of Information Security Policies within the Polokwane area: A case study. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Dennis Longley, Mark Branagan Developing Threat Networks for Risk Analysis of Information Systems. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Pieter Blaauw Fighting spam in a corporate environment using open-source solutions - a case study. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Christoff Breytenbach Introduction to Assessing and Securing Web Services. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Hennie A. Kruger, Wayne D. Kearney Measuring Information Security Awareness - A West Africa Gold Mining Environment Case. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Marianne Loock, Jan H. P. Eloff A new Access Control model based on the Chinese Wall Security Policy Model. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Barry Irwin Unlocking the armour : enabling intrusion detection and analysis of encrypted traffic streams. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Emile Parkin Cryptographic Key Management principles applied in South African Internet Banking. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Andreas U. Schmidt, Nicolai Kuntze, Thomas Rauch Security for Distributed Web-Services via Aspect-Oriented Programming. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1William List, David Brewer Measuring the effectivness of an internal control system. Search on Bibsonomy ISSA The full citation details ... 2005 DBLP  BibTeX  RDF
1Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter (eds.) Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Respickius Casmir Intrinsic Legal Issues In It Security. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Kjell Näckros Applied Holistic Approach For Security Awareness And Training - Computer Games As Means To Increase Users' Information And Communication Security Awareness. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Andrew Rutherford Towards Hippocratic Log Files. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Dominic White A Unified Architecture For Automatic Software Updates. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Fabio Ghioni Advanced Platform For Corporate Incident Detection And Management. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Yun (Lillian) Li Categorizing Vulnerabilities Using Data Clustering Techniques. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Marijke Coetzee A Logic-Based Access Control Approach For Web Services. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Jeffy Mwakalinga Integrated Security System Based On Security Assertion Markup Language Standard. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Morné Breedt Using A Central Data Repository For Biometric Authentication In Passport Systems. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Johan Van Niekerk Organisational Learning Models For Information Security Education. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Wynand van Staden A Virtual Machine For Security In A Relational Database Management System: Design Issues. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1K. K. Arthur An Investigation Into Computer Forensic Tools. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Martin Botha Utilizing Neural Networks For Effective Intrusion Detection. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Marek Zielinski Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Anna Granova South African Online Banking: Who Carries The Risk? Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Anitta Thomas Propagating Trust In The Web Services Framework. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1S. Nkundlaa The Protection Of Public Health Data - A Case Study. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Christer Andersson Privacy Enhanced Wap Browsing With Mcrowds Anonymity Properties And Performance Evaluation Of The Mcrowds System. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Evangelos D. Frangopoulos A Comparative Study Of Standards And Practices Related To Information Security Management. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Maree Pather Are Current B2b Security Standards Antithetical To Global Interoperability? Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Sheikh Muhammad Farhan High Data Rate 8-Bit Crypto Processor. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Wesley Brandi On Privacy And The Web. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Aung Htike Phyo A Framework For Monitoring Insider Misuse Of It Applications. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
1Say Joe Case Studies Of Japan, South Korea And China In Implementation Of IPv6. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
Displaying result #301 - #400 of 439 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license