Abstract is missing.
- AFA-RFID: Physical layer authentication for passive RFID tagsGregory Stuart Smith, Marijke Coetzee. 1-8 [doi]
- Self-sanitization of digital images using steganographyTayana Morkel. 1-6 [doi]
- The state of database forensic researchWerner K. Hauger, Martin S. Olivier. 1-8 [doi]
- Mapping 'Security Safeguard' Requirements in a data privacy legislation to an international privacy framework: A compliance methodologyIrene Govender. 1-8 [doi]
- Risk-driven security metrics development for an e-health IoT applicationReijo M. Savola, Pekka Savolainen, Antti Evesti, Habtamu Abie, Markus Sihvonen. 1-6 [doi]
- Adding event reconstruction to a Cloud Forensic Readiness modelVictor R. Kebande, Hein S. Venter. 1-9 [doi]
- Towards a digital forensic scienceMartin S. Olivier. 1-8 [doi]
- Data aggregation using homomorphic encryption in wireless sensor networksT. D. Ramotsoela, Gerhard P. Hancke. 1-8 [doi]
- The current state of digital forensic practitioners in South AfricaJason Jordaan, Karen Bradshaw. 1-9 [doi]
- A formal qualitative risk management approach for IT securityBessy Mahopo, Hanifa Abdullah, Mathias Mujinga. 1-8 [doi]
- A framework of opportunity-reducing techniques to mitigate the insider threatKeshnee Padayachee. 1-8 [doi]
- Characterization and analysis of NTP amplification based DDoS attacksL. Rudman, Barry V. W. Irwin. 1-5 [doi]
- Biometric identification: Are we ethically ready?Karen Renaud, Andrew Hoskins, Rossouw von Solms. 1-8 [doi]
- Robustness of computational intelligent assurance models when assessing e-Commerce sitesThembekile O. Mayayise, Isaac Olusegun Osunmakinde. 1-8 [doi]
- Prerequisites for building a Computer Security Incident Response capabilityRoderick Mooi, Reinhardt A. Botha. 1-8 [doi]
- The effects of the PoPI Act on small and medium enterprises in South AfricaJ. G. Botha, Mariki M. Eloff, I. Swart. 1-8 [doi]
- State-on-nationals' electronic communication surveillance in South Africa: A murky legal landscape to navigate?Murdoch Watney. 1-6 [doi]
- The adversarial threat posed by the NSA to the integrity of the internetJared Naude, Lynette Drevin. 1-7 [doi]
- Cloud supply chain resilienceAndrea Herrera, Lech J. Janczewski. 1-9 [doi]
- A model for the design of next generation e-supply chain digital forensic readiness toolsD. J. E. Masvosvere, Hein S. Venter. 1-9 [doi]
- Beacons and their uses for digital forensics purposesLuke Lubbe, Martin Oliver. 1-6 [doi]
- Evaluation and analysis of a software prototype for guidance and implementation of a standardized digital forensic investigation processMelissa Ingles, Aleksandar Valjarevic, Hein S. Venter. 1-8 [doi]
- Analyzing the security posture of South African websitesJabu Mtsweni. 1-8 [doi]
- SMT-constrained symbolic execution engine for integer overflow detection in C codePaul Muntean, Mustafizur Rahman, Andreas Ibing, Claudia Eckert. 1-8 [doi]
- Intrusion detection in Bluetooth enabled mobile phonesKishor Krishnan Nair, Albert Helberg, Johan Van Der Merwe. 1-8 [doi]
- Playing hide-and-seek: Detecting the manipulation of Android TimestampsHeloise Pieterse, Martin S. Olivier, Renier P. van Heerden. 1-8 [doi]
- Location aware mobile device managementJaco du Toit, Ian Ellefsen. 1-8 [doi]
- Towards a PHP webshell taxonomy using deobfuscation-assisted similarity analysisPeter M. Wrench, Barry V. W. Irwin. 1-8 [doi]
- Protection of Personal Information in the South African Cloud Computing environment: A framework for Cloud Computing adoptionDayne Edward Skolmen, Mariana Gerber. 1-10 [doi]
- Unsolicited Short Message Service marketing: A preliminary investigation into individual acceptance, perceptions of content, and privacy concernsMc Donald Van der Merwe, Wynand J. C. van Staden. 1-7 [doi]
- An investigation into credit card information disclosure through Point of Sale purchasesSuné von Solms. 1-8 [doi]
- IntroductionHein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff. 1 [doi]
- Access control for local personal smart spacesBrian Greaves, Marijke Coetzee. 1-8 [doi]