Abstract is missing.
- Privacy: In pursuit of Information security awarenessDuane Boucher, Stephen Flowerday. [doi]
- cPLC - A Cryptographic Programming Language and CompilerEndre Bangerter, Stephan Krenn, Matrial Seifriz, Ulrich Ultes-Nitsche. [doi]
- A Framework for DNS based detection and mitigation of malware infections on a networkEtienne Stalmans. [doi]
- Secret sharing in audio steganographyKa Fai Peter Chan. [doi]
- Guidelines for the creation of brain compatible cyber security educational material in Moodle 2.0Rayne Reid, Johan Van Niekerk, Rossouw von Solms. [doi]
- Enhancing Digital Business Ecosystem Trust and Reputation with Centrality MeasuresDonovan Isherwood, Marijke Coetzee. [doi]
- Informed Software Installation Through License Agreement CategorizationAnton Borg, Martin Boldt, Niklas Lavesson. [doi]
- Tartarus: A honeypot based malware tracking and mitigation frameworkSamuel O. Hunter, Barry Irwin. [doi]
- Detecting Scareware by Mining Variable Length Instruction SequencesRaja Khurram Shahzad, Niklas Lavesson. [doi]
- Towards a Cyber security aware rural communityMarthie Grobler, Zama Dlamini, Sipho Ngobeni, Aubrey Labuschagne. [doi]
- Network Forensics in a Clean-Slate Internet ArchitectureTinus Strauss, Martin S. Olivier. [doi]
- UML Modelling Of Network Warfare ExamplesNamosha Veerasamy, Jan H. P. Eloff. [doi]
- Exploring the Human Dimension of TETRANico Pieter Fouche, Kerry-Lynn Thomson. [doi]
- An approach to examine the Metadata and Data of a database Management System by making use of a forensic comparison toolHector Beyers, Martin S. Olivier, Gerhard P. Hancke. [doi]
- Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readinessStephen Serra, Hein S. Venter. [doi]
- An Architecture for Secure Searchable Cloud StorageRobert Koletka, Andrew Hutchison. [doi]
- Information Security Governance control through comprehensive policy architecturesRossouw von Solms, Kerry-Lynn Thomson, Mvikeli Maninjwa. [doi]
- Towards a Digital Forensics Readiness Framework for Public Key Infrastructure SystemsAleksandar Valjarevic, Hein S. Venter. [doi]
- Online Social Networks: Enhancing user trust through effective controls and identity managementRyan Galpin, Stephen Flowerday. [doi]
- A web-based information security governance toolbox for small-to-medium enterprises in Southern AfricaJacques Coertze, Johan Van Niekerk, Rossouw von Solms. [doi]
- State of the Art of Digital Forensic TechniquesEnos K. Mabuto, Hein S. Venter. [doi]
- A Review of Black Hole attack on AODV Routing in MANETElisha O. Ochola, Mariki M. Eloff. [doi]
- Isolating a cloud instance for a digital forensic investigationWaldo Delport, Michael Köhn, Martin S. Olivier. [doi]
- Analysing the fairness of trust-based Mobile Ad Hoc Network protocolsIvan Daniel Burke, Martin S. Olivier. [doi]
- Design of cyber security awareness game utilizing a social media frameworkAubrey Labuschagne, Namosha Veerasamy, Ivan Burke. [doi]
- An assessment of the role of cultural factors in information security awarenessHennie A. Kruger, Stephen Flowerday, Lynette Drevin, Tjaart Steyn. [doi]
- A Comparative Study of Fingerprint Thinning algorithmsNontokozo P. Khanyile, Jules-Raymond Tapamo, Erick Dube. [doi]
- Implementing Rootkits to Address Operating System VulnerabilitiesManuel Corregedor, Sebastiaan H. von Solms. [doi]
- Traffic Management in Next Generation Service Provider Networks - Are We There Yet?Ryan Gavin Goss, Reinhardt A. Botha. [doi]
- Nature and Forensic investigation of crime in Second LifeAnastassia S. Rakitianskaia, Martin S. Olivier, Antony K. Cooper. [doi]
- Adding digital forensic readiness to electronic communication using a security monitoring toolFranscois Van Staden, Hein S. Venter. [doi]
- Secure Cloud Computing: Benefits, Risks and ControlsMariana Carroll, Paula Kotzé, Alta van der Merwe. [doi]
- An adaptation of the awareness boundary model towards smartphone securitySean Allam, Stephen Flowerday. [doi]
- Information Security Competence Test with Regards to Password ManagementPaul Tarwireyi, Stephen Flowerday, Anass Bayaga. [doi]
- A Property Based Security Risk Analysis Through Weighted SimulationTimo Winkelvos, Carsten Rudolph, Jürgen Repp. [doi]
- Efficient Enforcement of Dynamic Access Control Policies for Outsourced DataAnne V. D. M. Kayem, Patrick Martin, Selim G. Akl. [doi]
- A Visualization and Modeling Tool for Security Metrics and Measurements ManagementReijo Savola, Petri Heinonen. [doi]
- Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity ModelsGeoffrey Karokola, Stewart Kowalski, Louise Yngström. [doi]
- An Evaluation of Lightweight Classification Methods for Identifying Malicious URLsShaun Egan. [doi]