default search action
8th ISSA 2009: Johannesburg, South Africa
- Hein S. Venter, Marijke Coetzee, Les Labuschagne:
Information Security South Africa Conference 2009, School of Tourism & Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings ISSA2009. ISSA, Pretoria, South Africa 2009, ISBN 978-1-86854-740-1
Reviewed Research Papers
- Marthie Grobler, Basie von Solms:
A Best Practice Approach to Live Forensic Acquisition. 3-13 - Cornelia Grobler, Buks Louwrens:
High-Level Integrated Vie of Digital Forensics. 15-34 - Sipho Josia Ngobeni, Hein S. Venter:
The Design of a Wireless Forensic Readiness Model(WFRM). 35-52 - Moses Dlamini, Mariki M. Eloff, Jan H. P. Eloff, Karin Höne:
BC3I - Towards Requirements Specification for Preparing an Information Security Budget. 53-68 - Reijo Savola:
Identification of Basic Measurable Security Components in Software-Intensive Systems. 69-80 - Geoffrey Karokola, Louise Yngström:
Discussing E-Government Maturity Models for the Developing World - Security View. 81-98 - Alastair Nottingham, Barry Irwin:
Investigating the effect of Genetic Algorithms on Filter Optimisation Within Fast Packet Classifiers. 99-116 - Arthur Godlstuck, Rabelani Dagada:
Help Us! We Want to be "E-Secured": Digital Banking Customers' Security Needs in South Africa. 117-136 - Haroon Meer:
An examination of the Generic Exploit Prevention Mechanisms on Apple's Leopard Operating System. 137-152 - Tristan Lavarack, Marijke Coetzee:
A Framework for Web Services Security Policy Negotiation. 153-170 - Marek P. Zielinski, Martin S. Olivier:
How Appropriate is K-Anonymity for Addressing the Conflict Between Privacy and Information Utility in Microdata ASnonymisation. 171-188 - Gregory Stuart Smith, Marijke Coetzee:
An Analysis of Authentication for Passive RFID Tags. 189-204 - Namosha Veerasamy, Barend Taute:
An Introduction to Emerging Threats and Vulnerabilities to Create User Awareness. 205-216 - Adrie Stander, A. Dunnet, J. Rizzo:
A Survey of Computer Crime and Security in South Africa. 217-226 - Jacqui Chetty, Marijke Coetzee:
Evaluating Information Security Controls Applied by Service-Oriented Architecture Governance Frameworks. 227-242 - George-Christian Pranschke, Barry Irwin, Richard J. Barnett:
Automated Firewall Rule Set Generation Through Passive Traffic Inspection. 243-252 - Edwin Donald Frauenstein, Rossouw von Solms:
Phishing: How an Organization can Protect Itself. 253-268 - Richard J. Barnett, Barry Irwin:
A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection Systems. 269-278 - Ryno Boshoff, Johan Van Niekerk:
E-mail Security awareness at Nelson Mandela Metropolitan University (Registrar's Division). 279-292 - Ickin Vural, Hein S. Venter:
Investigating Identity Concealing and Email Tracing Techniques. 293-308 - Rudi Victor, Andrew Rutherford, Reinhardt A. Botha:
Enhanced Presence Handling. 309-326 - Rabelani Dagada, Mariki M. Eloff, Lucas M. Venter:
Too Many Laws But Very Little Progress! Is South African Highly Acclaimed Information Security Legislation Redundant? 327-346 - Kennedy Njenga, Irwin Brown:
Inductively Deriving an Organisational Information Security Risk Management Agenda by Exploring Process Improvisation. 347-362 - Erik Hjelmås, Nils Kalstad Svendsen, Stephen D. Wolthusen:
Integrating Information Security with Information System Architecture and Administration Curricula. 363-376
Research in Progress Papers
- Carolin Latze, Andreas Ruppen, Ulrich Ultes-Nitsche:
A Proof of Concept Implementation of a Secure E-Commerce Authentication Scheme. 379-392 - Christian Schaefer, Thomas Walter, Matús Harvan, Alexander Pretschner:
Usage Control Policy Enforcement in OpenOffice.org and Information Flow. 393-406 - Innocentia Dlamini, Martin S. Olivier:
The Design of a Logical Traffic Isolation Forensic Model. 407-418 - Jeffy Mwakalinga, Stewart Kowalski, Louise Yngström:
Methodology for Considering Environments and Culture in Developing Information Security Systems. 419-436 - Franscois Van Staden, Hein S. Venter:
The State of the Art of Spam and Anti-Spam Strategies and a Possible Solution using Digital Forensics. 437-454 - Sipho Josia Ngobeni, Marthie Grobler:
Information Security Policies for Governmental Organisations, The Minimum Criteria. 455-466 - Thomas Monk, Johan Van Niekerk, Rossouw von Solms:
Concealing the Medicine: Information Security Education through Game Play. 467-478 - Bradley Cowie, Barry Irwin, Richard J. Barnett:
Management, Processing and Analysis of Cryptographic Network Protocols. 479-488 - Anna B. Adimo, Fisseha Mekuria:
Mobile Communications Security Research at CSIR-MDS. 489-490
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.