


default search action
2. InfoSec2015: Cape Town, South Africa
- 2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015. IEEE 2015, ISBN 978-1-4673-6988-6
- Zahra Waheed
, M. Usman Akram, Amna Waheed, Arslan Shaukat:
Robust extraction of blood vessels for retinal recognition. 1-4 - Muhammad Najam Dar, M. Usman Akram, Anam Usman, Shoab Ahmad Khan:
ECG biometric identification for general population using multiresolution analysis of DWT based features. 5-10 - Madiha Tahir, M. Usman Akram:
Online signature verification using hybrid features. 11-16 - Muhammad Sarfraz, Syed M. A. J. Rizvi:
An intelligent system for Online Signature Verification. 17-22 - Michael Hopkins, Ali Dehghantanha:
Exploit Kits: The production line of the Cybercrime economy? 23-27 - Antesar M. Shabut, Keshav P. Dahal
, Irfan Awan, Zeeshan Pervez
:
Route optimasation based on multidimensional trust evaluation model in mobile ad hoc networks. 28-34 - Mvelo Walaza, Marianne Loock, Elmarie Kritzinger
:
A pragmatic approach towards the integration of ICT security awareness into the South African education system. 35-40 - Haoua Cheribi, Mohamed-Khireddine Kholladi
:
A security model for complex applications based on normative multi-agents system. 41-46 - Wenli Shang, Ming Wan, Peng Zeng
, Quansheng Qiao:
Research on self-learning method on generation and optimization of industrial firewall rules. 47-52 - T. Charles, Michael Pollock:
Digital forensic investigations at universities in South Africa. 53-58 - Kevin Hughes, Adrie Stander
, Val A. Hooper
:
eDiscovery in South Africa and the challenges it faces. 59-65 - Reema Al Mushcab, Pavel Gladyshev
:
The significance of different backup applications in retrieving social networking forensic artifacts from Android-based mobile devices. 66-71 - Eric Amankwa
, Marianne Loock, Elmarie Kritzinger
:
Enhancing information security education and awareness: Proposed characteristics for a model. 72-77 - Bassey Isong
, Naison Gasela, Ifeoma U. Ohaeri, Elegbeleye Femi:
RFID-based design-theoretical framework for combating police impersonation in South Africa. 78-85 - Kennedy Njenga
, Sifiso Ndlovu:
Mobile banking and information security risks: Demand-side predilections of South African lead-users. 86-92 - Ruilin Zhu, Lech J. Janczewski:
Typology of information systems security research: A methodological perspective. 93-98 - Fayyaadh Parker, Jacques Ophoff
, Jean-Paul Van Belle, Ross Karia:
Security awareness and adoption of security controls by smartphone users. 99-104 - Mostafa Doroudian, Narges Arastouie, Mohammad Talebi, Ali Reza Ghanbarian:
Multilayered database intrusion detection system for detecting malicious behaviors in big data transaction. 105-110 - Shabier Parker, Jean-Paul Van Belle:
Lifelogging and lifeblogging: Privacy issues and influencing factors in South Africa. 111-117 - Mustafa Hassan Saad, Ahmed Serageldin, Goda Ismaeel Salama
:
Android spyware disease and medication. 118-125 - Ileen E. van Vuuren, Elmarie Kritzinger
, Conrad Mueller:
Identifying gaps in IT retail Information Security policy implementation processes. 126-133 - Topside E. Mathonsi
:
Optimized handoff and secure roaming model for wireless networks. 134-139 - Lineo Mejaele, Elisha Oketch Ochola
:
Analysing the impact of black hole attack on DSR-based MANET: The hidden network destructor. 140-144 - Walid Al-Ahmad, Basil Mohammed:
A code of practice for effective information security risk management using COBIT 5. 145-151 - Delwar Alam, Touhid Bhuiyan
, Md. Alamgir Kabir
, Tanjila Farah:
SQLi vulnerabilty in education sector websites of Bangladesh. 152-157 - Ar Kar Kyaw, Franco Sioquim, Justin Joseph
:
Dictionary attack on Wordpress: Security and forensic analysis. 158-164 - Ar Kar Kyaw, Yuzhu Chen, Justin Joseph
:
Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2. 165-170 - Nyalleng Moorosi, Vukosi Marivate
:
Privacy in mining crime data from social Media: A South African perspective. 171-175

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.