Abstract is missing.
- A Proof-of-Concept Implementation of EAP-TLS with TPM SupportCarolin Latze, Ulrich Ultes-Nitsche. 1-12 [doi]
- A Novel Security Metrics Taxonomy for R&D OrganisationsReijo Savola. 1-12 [doi]
- Immune System Based Intrusion Detection SystemChristoph Ehret, Ulrich Ultes-Nitsche. 1-12 [doi]
- Collective Improvisation: Complementing Information Security Frameworks with Self-PolicingKennedy Njenga, Irwin Brown. 1-16 [doi]
- Application of Message Digests for the Verification of Logical Forensic DataPontjho Mokhonoana, Martin S. Olivier. 1-11 [doi]
- Password Management: Empirical Results from a RSA and USA StudyHennie A. Kruger, Tjaart Steyn, Lynette Drevin, Dawn Medlin. 1-11 [doi]
- The Information Security of a Bluetooth-Enabled Handheld DeviceFrankie Tvrz, Marijke Coetzee. 1-12 [doi]
- Bloom s Taxonomy for Information Security EducationJohan Van Niekerk, Rossouw von Solms. 1-13 [doi]
- The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further ResearchTony Stephanou, Rabelani Dagada. 1-21 [doi]
- Emerging Framework for The Evaluation of Open Source Security ToolsElmarie Biermann, Jan Mentz. 1-15 [doi]
- Spam Over Internet Telephony and How to Deal with itRachid El Khayari, Nicolai Kuntze, Andreas Schmidt. 1-25 [doi]
- No Age Discrimination for BiometricsMarthie Lessing, Lara Weissenberger. 1-26 [doi]
- Social Aspects of Information SecurityEvangelos Frangopoulos, Mariki M. Eloff, Lucas M. Venter. 1-33 [doi]
- A User Centric Model for Online Identity and Access ManagementMatthew Deas, Stephen Flowerday. 1-21 [doi]
- Lessons Learnt in the Process of Computerization, Automation and Management of ICT Security in the Developing World: A Case Study of The University of Dar Es Salaam, TanzaniaGeoffrey Karokola, Louise Yngström. 1-24 [doi]
- An Introduction to Standards related to Information SecurityJohann Amsenga. 1-18 [doi]
- Towards a Framework for a Network Warfare CapabilityNamosha Veerasamy, Jan H. P. Eloff. 1-18 [doi]
- UML Modelling of Digital Forensic Process Models (DFPMs)Michal Köhn, Jan H. P. Eloff, Martin S. Olivier. 1-13 [doi]
- Spam Construction TrendsBarry Irwin, Blake Friedman. 1-12 [doi]
- Computer Monitoring in the 21st Century WorkplaceSri Warna Mahanamahewa. 1-15 [doi]
- A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious CodeLeonard Shand, Theodore Tryfonas. 1-18 [doi]
- The IP Protection of Electronic Databases: Copyright or Copywrong?Tana Pistorius. 1-18 [doi]
- The Use of File Timestamps in Digital ForensicsRenico Koen, Martin S. Olivier. 1-16 [doi]
- The Principle of Security Safeguards: Accidental ActivitiesRasika Dayarathna. 1-18 [doi]