![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
15th ISSA 2016: Johannesburg, South Africa
- Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff:
2016 Information Security for South Africa, ISSA 2016, Johannesburg, South Africa, August 17-18, 2016. IEEE 2016, ISBN 978-1-5090-2473-5 - Noluvuyo Fani, Rossouw von Solms, Mariana Gerber:
A framework towards governing "Bring Your Own Device in SMMEs". 1-8 - Paulus Swartz
, Adéle da Veiga
:
PoPI Act - opt-in and opt-out compliance from a data value chain perspective: A South African insurance industry experiment. 9-17 - Petrus M. J. Delport, Mariana Gerber, Nader Sohrabi Safa
:
An interactive visual library model to improve awareness in handling of business information. 18-26 - Ryan De Kock, Lynn Ann Futcher:
Mobile device usage in higher education institutions in South Africa. 27-34 - Yusuf Moosa Motara
, Barry Irwin
:
SHA-1 and the Strict Avalanche Criterion. 35-40 - J. N. Samuel, Warren P. Du Plessis
:
Specific emitter identification for enhanced access control security. 41-47 - Nicholas Scharnick, Mariana Gerber, Lynn Futcher:
Review of data storage protection approaches for POPI compliance. 48-55 - Olanrewaju B. Wojuola, Stanley H. Mneney, Viranjay M. Srivastava
:
CDMA in signal encryption and information security. 56-61 - Lineo Mejaele, Elisha Oketch Ochola
:
Effect of varying node mobility in the analysis of black hole attack on MANET reactive routing protocols. 62-68 - Johannes S. Vorster, Renier P. van Heerden, Barry Irwin
:
The pattern-richness of Graphical passwords. 69-76 - Lauren Rudman, Barry Irwin
:
Dridex: Analysis of the traffic and automatic generation of IOCs. 77-84 - Mfundo Glenn Masango, Francois Mouton, Alastair Nottingham, Jabu Mtsweni:
Context Aware Mobile Application for mobile devices. 85-90 - Wynand J. C. van Staden, Etienne van der Poel
:
Team formation in digital forensics. 91-97 - Edwin Donald Frauenstein
, Stephen V. Flowerday:
Social network phishing: Becoming habituated to clicks and ignorant to threats? 98-105 - Othoman Elaswad, Christian Damsgaard Jensen
:
Identity management for e-government Libya as a case study. 106-113 - Chollette C. Olisah, Peter Ogedebe:
Recognizing surgically altered faces using local edge gradient Gabor magnitude pattern. 114-120 - Alan Herbert, Barry Irwin
:
Adaptable exploit detection through scalable NetFlow analysis. 121-128 - Patrick Monamo, Vukosi Marivate
, Bheki Twala
:
Unsupervised learning for robust Bitcoin fraud detection. 129-134
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.