


default search action
2. InfoSec2015: Cape Town, South Africa
- 2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015. IEEE 2015, ISBN 978-1-4673-6988-6

- Zahra Waheed

, M. Usman Akram, Amna Waheed, Arslan Shaukat:
Robust extraction of blood vessels for retinal recognition. 1-4 - Muhammad Najam Dar, M. Usman Akram, Anam Usman, Shoab Ahmad Khan:

ECG biometric identification for general population using multiresolution analysis of DWT based features. 5-10 - Madiha Tahir

, M. Usman Akram:
Online signature verification using hybrid features. 11-16 - Muhammad Sarfraz, Syed M. A. J. Rizvi:

An intelligent system for Online Signature Verification. 17-22 - Michael Hopkins, Ali Dehghantanha:

Exploit Kits: The production line of the Cybercrime economy? 23-27 - Antesar M. Shabut, Keshav P. Dahal

, Irfan Awan, Zeeshan Pervez
:
Route optimasation based on multidimensional trust evaluation model in mobile ad hoc networks. 28-34 - Mvelo Walaza, Marianne Loock, Elmarie Kritzinger

:
A pragmatic approach towards the integration of ICT security awareness into the South African education system. 35-40 - Haoua Cheribi, Mohamed-Khireddine Kholladi

:
A security model for complex applications based on normative multi-agents system. 41-46 - Wenli Shang, Ming Wan, Peng Zeng

, Quansheng Qiao:
Research on self-learning method on generation and optimization of industrial firewall rules. 47-52 - T. Charles, Michael Pollock:

Digital forensic investigations at universities in South Africa. 53-58 - Kevin Hughes, Adrie Stander

, Val A. Hooper
:
eDiscovery in South Africa and the challenges it faces. 59-65 - Reema Al Mushcab, Pavel Gladyshev

:
The significance of different backup applications in retrieving social networking forensic artifacts from Android-based mobile devices. 66-71 - Eric Amankwa

, Marianne Loock, Elmarie Kritzinger
:
Enhancing information security education and awareness: Proposed characteristics for a model. 72-77 - Bassey Isong

, Naison Gasela, Ifeoma U. Ohaeri, Elegbeleye Femi:
RFID-based design-theoretical framework for combating police impersonation in South Africa. 78-85 - Kennedy Njenga

, Sifiso Ndlovu:
Mobile banking and information security risks: Demand-side predilections of South African lead-users. 86-92 - Ruilin Zhu, Lech J. Janczewski:

Typology of information systems security research: A methodological perspective. 93-98 - Fayyaadh Parker, Jacques Ophoff

, Jean-Paul Van Belle, Ross Karia:
Security awareness and adoption of security controls by smartphone users. 99-104 - Mostafa Doroudian, Narges Arastouie, Mohammad Talebi, Ali Reza Ghanbarian:

Multilayered database intrusion detection system for detecting malicious behaviors in big data transaction. 105-110 - Shabier Parker, Jean-Paul Van Belle:

Lifelogging and lifeblogging: Privacy issues and influencing factors in South Africa. 111-117 - Mustafa Hassan Saad, Ahmed Serageldin, Goda Ismaeel Salama

:
Android spyware disease and medication. 118-125 - Ileen E. van Vuuren, Elmarie Kritzinger

, Conrad Mueller:
Identifying gaps in IT retail Information Security policy implementation processes. 126-133 - Topside E. Mathonsi

:
Optimized handoff and secure roaming model for wireless networks. 134-139 - Lineo Mejaele, Elisha Oketch Ochola

:
Analysing the impact of black hole attack on DSR-based MANET: The hidden network destructor. 140-144 - Walid Al-Ahmad, Basil Mohammed:

A code of practice for effective information security risk management using COBIT 5. 145-151 - Delwar Alam, Touhid Bhuiyan

, Md. Alamgir Kabir
, Tanjila Farah
:
SQLi vulnerabilty in education sector websites of Bangladesh. 152-157 - Ar Kar Kyaw, Franco Sioquim, Justin Joseph

:
Dictionary attack on Wordpress: Security and forensic analysis. 158-164 - Ar Kar Kyaw, Yuzhu Chen, Justin Joseph

:
Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2. 165-170 - Nyalleng Moorosi, Vukosi Marivate

:
Privacy in mining crime data from social Media: A South African perspective. 171-175

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














