![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
11th ISSA 2012: Johannesburg, South Africa
- Hein S. Venter, Marianne Loock, Marijke Coetzee:
2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012. IEEE 2012, ISBN 978-1-4673-2160-0 - Hein S. Venter
, Marianne Loock
, Marijke Coetzee
:
Introduction. 1 - Jason Jordaan:
A Sample of digital forensic quality assurance in the South African criminal justice system. 1-7 - Heloise Pieterse, Martin S. Olivier
:
Android botnets on the rise: Trends and characteristics. 1-5 - Etienne Stalmans, Samuel O. Hunter, Barry Irwin
:
Geo-spatial autocorrelation as a metric for the detection of Fast-Flux botnet domains. 1-7 - Reijo M. Savola:
Strategies for security measurement objective decomposition. 1-8 - Mark M. Seeger, Stephen D. Wolthusen:
A model for partially asynchronous observation of malicious behavior. 1-7 - Caroline Oehri, Stephanie Teufel
:
Social media security culture. 1-5 - Tapiwa Gundu
, Stephen Flowerday
:
The enemy within: A behavioural intention model and an information security awareness process. 1-8 - Sobhana Rama, Stephen Flowerday
, Duane Boucher:
Information confidentiality and the Chinese Wall Model in Government tender fraud. 1-8 - Christien Kroeze, Martin S. Olivier
:
Gamifying authentication. 1-8 - Nureni Ayofe Azeez
, Isabella Margarethe Venter
:
Towards achieving scalability and interoperability in a triple-domain grid-based environment (3DGBE). 1-10 - Aleksandar Valjarevic, Hein S. Venter
:
Harmonised digital forensic investigation process model. 1-10 - Irene Okere, Johan Van Niekerk, Mariana Carroll:
Assessing information security culture: A critical analysis of current approaches. 1-8 - Phumezo Ntlatywa
, Reinhardt A. Botha
, Bertram Haskins:
Claimed vs observed information disclosure on social networking sites. 1-6 - Manuel Corregedor, Sebastiaan H. von Solms:
ATE: Anti-malware technique evaluator. 1-8 - Frank Breitinger
, Harald Baier:
Properties of a similarity preserving hash function and their realization in sdhash. 1-8 - Tiny du Toit, Hennie A. Kruger:
Filtering spam e-mail with Generalized Additive Neural Networks. 1-8 - Xuefei Leng, Gerhard P. Hancke
, Keith Mayes, Konstantinos Markantonakis:
Tag Group Authentication Using Bit-Collisions. 1-8 - Nickson M. Karie
, Hein S. Venter
:
Measuring semantic similarity between digital forensics terminologies using web search engines. 1-9 - Samuel O. Hunter, Etienne Stalmans, Barry Irwin
, John Richter:
Remote fingerprinting and multisensor data fusion. 1-8 - Marius Potgieter, Johan Van Niekerk:
The use of computer vision technologies to augment human monitoring of secure computing facilities. 1-6 - George Sibiya
, Hein S. Venter
, Sipho Ngobeni, Thomas Fogwill
:
Guidelines for procedures of a harmonised digital forensic process in network forensics. 1-7 - Antonio Pooe, Les Labuschagne
:
A conceptual model for digital forensic readiness. 1-8 - Kennedy Njenga
, Sifiso Ndlovu:
On privacy calculus and underlying consumer concerns influencing mobile banking subscriptions. 1-9 - Neil J. Croft:
On forensics: A silent SMS attack. 1-4 - Barry Irwin
:
A network telescope perspective of the Conficker outbreak. 1-8 - Anne V. D. M. Kayem, Azhar Deshai, Stuart Hammer:
On anonymizing social network graphs. 1-8
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.