Abstract is missing.
- ATE: Anti-malware technique evaluatorManuel Corregedor, Sebastiaan H. von Solms. 1-8 [doi]
- Measuring semantic similarity between digital forensics terminologies using web search enginesNickson M. Karie, Hein S. Venter. 1-9 [doi]
- Filtering spam e-mail with Generalized Additive Neural NetworksTiny du Toit, Hennie Kruger. 1-8 [doi]
- On forensics: A silent SMS attackNeil J. Croft. 1-4 [doi]
- Tag Group Authentication Using Bit-CollisionsXuefei Leng, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis. 1-8 [doi]
- On anonymizing social network graphsAnne V. D. M. Kayem, Azhar Deshai, Stuart Hammer. 1-8 [doi]
- Towards achieving scalability and interoperability in a triple-domain grid-based environment (3DGBE)Nureni Ayofe Azeez, Isabella M. Venter. 1-10 [doi]
- Claimed vs observed information disclosure on social networking sitesPhumezo Ntlatywa, Reinhardt A. Botha, Bertram Haskins. 1-6 [doi]
- Harmonised digital forensic investigation process modelAleksandar Valjarevic, Hein S. Venter. 1-10 [doi]
- Properties of a similarity preserving hash function and their realization in sdhashFrank Breitinger, Harald Baier. 1-8 [doi]
- Assessing information security culture: A critical analysis of current approachesIrene Okere, Johan Van Niekerk, Mariana Carroll. 1-8 [doi]
- The use of computer vision technologies to augment human monitoring of secure computing facilitiesMarius Potgieter, Johan Van Niekerk. 1-6 [doi]
- The enemy within: A behavioural intention model and an information security awareness processTapiwa Gundu, Stephen Flowerday. 1-8 [doi]
- Social media security cultureCaroline Oehri, Stephanie Teufel. 1-5 [doi]
- Remote fingerprinting and multisensor data fusionSamuel O. Hunter, Etienne Stalmans, Barry Irwin, John Richter. 1-8 [doi]
- A Sample of digital forensic quality assurance in the South African criminal justice systemJason Jordaan. 1-7 [doi]
- A model for partially asynchronous observation of malicious behaviorMark M. Seeger, Stephen D. Wolthusen. 1-7 [doi]
- Geo-spatial autocorrelation as a metric for the detection of Fast-Flux botnet domainsEtienne Stalmans, Samuel O. Hunter, Barry Irwin. 1-7 [doi]
- Android botnets on the rise: Trends and characteristicsHeloise Pieterse, Martin S. Olivier. 1-5 [doi]
- Strategies for security measurement objective decompositionReijo M. Savola. 1-8 [doi]
- Gamifying authenticationChristien Kroeze, Martin S. Olivier. 1-8 [doi]
- IntroductionHein S. Venter, Marianne Loock, Marijke Coetzee. 1 [doi]
- Guidelines for procedures of a harmonised digital forensic process in network forensicsGeorge Sibiya, Hein S. Venter, Sipho Ngobeni, Thomas Fogwill. 1-7 [doi]
- Information confidentiality and the Chinese Wall Model in Government tender fraudSobhana Rama, Stephen Flowerday, Duane Boucher. 1-8 [doi]
- A network telescope perspective of the Conficker outbreakBarry Irwin. 1-8 [doi]
- On privacy calculus and underlying consumer concerns influencing mobile banking subscriptionsKennedy Njenga, Sifiso Ndlovu. 1-9 [doi]
- A conceptual model for digital forensic readinessAntonio Pooe, Les Labuschagne. 1-8 [doi]