Abstract is missing.
- Robust extraction of blood vessels for retinal recognitionZahra Waheed, M. Usman Akram, Amna Waheed, Arslan Shaukat. 1-4 [doi]
- ECG biometric identification for general population using multiresolution analysis of DWT based featuresMuhammad Najam Dar, M. Usman Akram, Anam Usman, Shoab Ahmad Khan. 5-10 [doi]
- Online signature verification using hybrid featuresMadiha Tahir, M. Usman Akram. 11-16 [doi]
- An intelligent system for Online Signature VerificationMuhammad Sarfraz, Syed M. A. J. Rizvi. 17-22 [doi]
- Exploit Kits: The production line of the Cybercrime economy?Michael Hopkins, Ali Dehghantanha. 23-27 [doi]
- Route optimasation based on multidimensional trust evaluation model in mobile ad hoc networksAntesar M. Shabut, Keshav P. Dahal, Irfan Awan, Zeeshan Pervez. 28-34 [doi]
- A pragmatic approach towards the integration of ICT security awareness into the South African education systemMvelo Walaza, Marianne Loock, Elmarie Kritzinger. 35-40 [doi]
- A security model for complex applications based on normative multi-agents systemHaoua Cheribi, Mohamed-Khireddine Kholladi. 41-46 [doi]
- Research on self-learning method on generation and optimization of industrial firewall rulesWenli Shang, Ming Wan, Peng Zeng, Quansheng Qiao. 47-52 [doi]
- Digital forensic investigations at universities in South AfricaT. Charles, M. Pollock. 53-58 [doi]
- eDiscovery in South Africa and the challenges it facesKevin Hughes, Adrie Stander, Val Hooper. 59-65 [doi]
- The significance of different backup applications in retrieving social networking forensic artifacts from Android-based mobile devicesReema Al Mushcab, Pavel Gladyshev. 66-71 [doi]
- Enhancing information security education and awareness: Proposed characteristics for a modelEric Amankwa, Marianne Loock, Elmarie Kritzinger. 72-77 [doi]
- RFID-based design-theoretical framework for combating police impersonation in South AfricaBassey Isong, Naison Gasela, Ifeoma U. Ohaeri, Elegbeleye Femi. 78-85 [doi]
- Mobile banking and information security risks: Demand-side predilections of South African lead-usersKennedy Njenga, Sifiso Ndlovu. 86-92 [doi]
- Typology of information systems security research: A methodological perspectiveRuilin Zhu, Lech J. Janczewski. 93-98 [doi]
- Security awareness and adoption of security controls by smartphone usersFayyaadh Parker, Jacques Ophoff, Jean-Paul Van Belle, Ross Karia. 99-104 [doi]
- Multilayered database intrusion detection system for detecting malicious behaviors in big data transactionMostafa Doroudian, Narges Arastouie, Mohammad Talebi, Ali Reza Ghanbarian. 105-110 [doi]
- Lifelogging and lifeblogging: Privacy issues and influencing factors in South AfricaShabier Parker, Jean-Paul Van Belle. 111-117 [doi]
- Android spyware disease and medicationMustafa Hassan Saad, Ahmed Serageldin, Goda Ismaeel Salama. 118-125 [doi]
- Identifying gaps in IT retail Information Security policy implementation processesIleen E. van Vuuren, Elmarie Kritzinger, Conrad Mueller. 126-133 [doi]
- Optimized handoff and secure roaming model for wireless networksTopside E. Mathonsi. 134-139 [doi]
- Analysing the impact of black hole attack on DSR-based MANET: The hidden network destructorLineo Mejaele, Elisha Oketch Ochola. 140-144 [doi]
- A code of practice for effective information security risk management using COBIT 5Walid Al-Ahmad, Basil Mohammed. 145-151 [doi]
- SQLi vulnerabilty in education sector websites of BangladeshDelwar Alam, Touhid Bhuiyan, Md. Alamgir Kabir, Tanjila Farah. 152-157 [doi]
- Dictionary attack on Wordpress: Security and forensic analysisAr Kar Kyaw, Franco Sioquim, Justin Joseph. 158-164 [doi]
- Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2Ar Kar Kyaw, Yuzhu Chen, Justin Joseph. 165-170 [doi]
- Privacy in mining crime data from social Media: A South African perspectiveNyalleng Moorosi, Vukosi N. Marivate. 171-175 [doi]