researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2015
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Adrie Stander
Ahmed Serageldin
Ali Dehghantanha
Ali Reza Ghanbarian
Amna Waheed
Anam Usman
Antesar M. Shabut
Ar Kar Kyaw
Arslan Shaukat
Basil Mohammed
Bassey Isong
Conrad Mueller
Delwar Alam
Elegbeleye Femi
Elisha Oketch Ochola
Elmarie Kritzinger
Jean-Paul Van Belle
Justin Joseph
M. Usman Akram
Marianne Loock
Filter by Top terms
[+]
OR
AND
NOT
1
africa
african
analysis
android
applications
attack
awareness
data
detection
education
evaluation
features
forensic
information
mobile
model
security
south
system
using
InfoSec (infosec)
Editions
Publications
Viewing Publication 1 - 29 from 29
2015
2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015
IEEE,
2015.
[doi]
A code of practice for effective information security risk management using COBIT 5
Walid Al-Ahmad
,
Basil Mohammed
.
infosec 2015
:
145-151
[doi]
SQLi vulnerabilty in education sector websites of Bangladesh
Delwar Alam
,
Touhid Bhuiyan
,
Md. Alamgir Kabir
,
Tanjila Farah
.
infosec 2015
:
152-157
[doi]
Enhancing information security education and awareness: Proposed characteristics for a model
Eric Amankwa
,
Marianne Loock
,
Elmarie Kritzinger
.
infosec 2015
:
72-77
[doi]
Digital forensic investigations at universities in South Africa
T. Charles
,
M. Pollock
.
infosec 2015
:
53-58
[doi]
A security model for complex applications based on normative multi-agents system
Haoua Cheribi
,
Mohamed-Khireddine Kholladi
.
infosec 2015
:
41-46
[doi]
ECG biometric identification for general population using multiresolution analysis of DWT based features
Muhammad Najam Dar
,
M. Usman Akram
,
Anam Usman
,
Shoab Ahmad Khan
.
infosec 2015
:
5-10
[doi]
Multilayered database intrusion detection system for detecting malicious behaviors in big data transaction
Mostafa Doroudian
,
Narges Arastouie
,
Mohammad Talebi
,
Ali Reza Ghanbarian
.
infosec 2015
:
105-110
[doi]
Exploit Kits: The production line of the Cybercrime economy?
Michael Hopkins
,
Ali Dehghantanha
.
infosec 2015
:
23-27
[doi]
eDiscovery in South Africa and the challenges it faces
Kevin Hughes
,
Adrie Stander
,
Val Hooper
.
infosec 2015
:
59-65
[doi]
RFID-based design-theoretical framework for combating police impersonation in South Africa
Bassey Isong
,
Naison Gasela
,
Ifeoma U. Ohaeri
,
Elegbeleye Femi
.
infosec 2015
:
78-85
[doi]
Dictionary attack on Wordpress: Security and forensic analysis
Ar Kar Kyaw
,
Franco Sioquim
,
Justin Joseph
.
infosec 2015
:
158-164
[doi]
Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2
Ar Kar Kyaw
,
Yuzhu Chen
,
Justin Joseph
.
infosec 2015
:
165-170
[doi]
Optimized handoff and secure roaming model for wireless networks
Topside E. Mathonsi
.
infosec 2015
:
134-139
[doi]
Analysing the impact of black hole attack on DSR-based MANET: The hidden network destructor
Lineo Mejaele
,
Elisha Oketch Ochola
.
infosec 2015
:
140-144
[doi]
Privacy in mining crime data from social Media: A South African perspective
Nyalleng Moorosi
,
Vukosi N. Marivate
.
infosec 2015
:
171-175
[doi]
The significance of different backup applications in retrieving social networking forensic artifacts from Android-based mobile devices
Reema Al Mushcab
,
Pavel Gladyshev
.
infosec 2015
:
66-71
[doi]
Mobile banking and information security risks: Demand-side predilections of South African lead-users
Kennedy Njenga
,
Sifiso Ndlovu
.
infosec 2015
:
86-92
[doi]
Security awareness and adoption of security controls by smartphone users
Fayyaadh Parker
,
Jacques Ophoff
,
Jean-Paul Van Belle
,
Ross Karia
.
infosec 2015
:
99-104
[doi]
Lifelogging and lifeblogging: Privacy issues and influencing factors in South Africa
Shabier Parker
,
Jean-Paul Van Belle
.
infosec 2015
:
111-117
[doi]
Android spyware disease and medication
Mustafa Hassan Saad
,
Ahmed Serageldin
,
Goda Ismaeel Salama
.
infosec 2015
:
118-125
[doi]
An intelligent system for Online Signature Verification
Muhammad Sarfraz
,
Syed M. A. J. Rizvi
.
infosec 2015
:
17-22
[doi]
Route optimasation based on multidimensional trust evaluation model in mobile ad hoc networks
Antesar M. Shabut
,
Keshav P. Dahal
,
Irfan Awan
,
Zeeshan Pervez
.
infosec 2015
:
28-34
[doi]
Research on self-learning method on generation and optimization of industrial firewall rules
Wenli Shang
,
Ming Wan
,
Peng Zeng
,
Quansheng Qiao
.
infosec 2015
:
47-52
[doi]
Online signature verification using hybrid features
Madiha Tahir
,
M. Usman Akram
.
infosec 2015
:
11-16
[doi]
Identifying gaps in IT retail Information Security policy implementation processes
Ileen E. van Vuuren
,
Elmarie Kritzinger
,
Conrad Mueller
.
infosec 2015
:
126-133
[doi]
Robust extraction of blood vessels for retinal recognition
Zahra Waheed
,
M. Usman Akram
,
Amna Waheed
,
Arslan Shaukat
.
infosec 2015
:
1-4
[doi]
A pragmatic approach towards the integration of ICT security awareness into the South African education system
Mvelo Walaza
,
Marianne Loock
,
Elmarie Kritzinger
.
infosec 2015
:
35-40
[doi]
Typology of information systems security research: A methodological perspective
Ruilin Zhu
,
Lech J. Janczewski
.
infosec 2015
:
93-98
[doi]
Sign in
or
sign up
to see more results.