Login / Signup
ISSA
2002
2008
2014
2020
2002
2020
Keyphrases
Publications
volume 1166, 2020
Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings
ISSA
1166 (2020)
2019
Jaco du Toit
PAUDIT: A Distributed Data Architecture for Fitness Data.
ISSA
(2019)
Ntsako Baloyi
,
Paula Kotzé
Data Privacy Compliance Benefits for Organisations - A Cyber-Physical Systems and Internet of Things Study.
ISSA
(2019)
Faith Lekota
,
Marijke Coetzee
An Aviation Sector CSIRT for Sub-Saharan Africa.
ISSA
(2019)
Sunthoshan G. Govender
,
Elmarie Kritzinger
,
Marianne Loock
Information Security Cost Reduction Through Social Means.
ISSA
(2019)
Gershon Hutchinson
,
Jacques Ophoff
A Descriptive Review and Classification of Organizational Information Security Awareness Research.
ISSA
(2019)
Dirk Snyman
,
Hennie A. Kruger
A Management Decision Support System for Evaluating Information Security Behaviour.
ISSA
(2019)
Kenneth Ayong
,
Rennie Naidoo
An Institutional Trust Perspective of Cloud Adoption Among SMEs in South Africa.
ISSA
(2019)
Sophia Moganedi
,
Dalenca Pottas
Threats and Vulnerabilities Affecting Fitness Wearables: Security and Privacy Theoretical Analysis.
ISSA
(2019)
Abdramane Bah
,
Pascal André
,
J. Christian Attiogbé
,
Jacqueline Konaté
Federation of Services from Autonomous Domains with Heterogeneous Access Control Models.
ISSA
(2019)
Lelethu Zazaza
,
H. S. Venter
,
George Sibiya
A Conceptual Model for Consent Management in South African e-Health Systems for Privacy Preservation.
ISSA
(2019)
Anthony Bolton
,
Leila Goosen
,
Elmarie Kritzinger
Security Aspects of an Empirical Study into the Impact of Digital Transformation via Unified Communication and Collaboration Technologies on the Productivity and Innovation of a Global Automotive Enterprise.
ISSA
(2019)
Indren Govender
,
Bruce Watson
Theorising Information Security Policy Violations.
ISSA
(2019)
2017
Francois Mouton
,
Alastair Nottingham
,
Louise Leenen
,
H. S. Venter
Underlying finite state machine for the social engineering attack detection model.
ISSA
(2017)
Ambrosio Patricio Vumo
,
Josef Spillner
,
Stefan Köpsell
Analysis of Mozambican websites: How do they protect their users?
ISSA
(2017)
2017 Information Security for South Africa, ISSA 2017, Johannesburg, South Africa, August 16-17, 2017
ISSA
(2017)
Adéle da Veiga
,
Ruthea Vorster
,
Colin Pilkington
,
Hanifa Abdullah
Compliance with the protection of personal information act and consumer privacy expectations: A comparison between the retail and medical aid industry.
ISSA
(2017)
Sean Pennefather
,
Barry Irwin
Design and application of link: A DSL for network frame manipulation.
ISSA
(2017)
Mohammad Aldabbas
,
Stephanie Teufel
,
Bernd Teufel
The importance of security culture for crowd energy systems.
ISSA
(2017)
Sarathiel Chaipa
,
Mariki M. Eloff
Towards the development of an effective intrusion detection model.
ISSA
(2017)
Marc Pelteret
,
Jacques Ophoff
Organizational information privacy strategy and the impact of the PoPI act.
ISSA
(2017)
David Kenyon
,
Jan H. P. Eloff
Big data science for predicting insurance claims fraud.
ISSA
(2017)
Javan Mnjama
,
Greg Foster
,
Barry Irwin
A privacy and security threat assessment framework for consumer health wearables.
ISSA
(2017)
Karen Renaud
,
Verena Zimmermann
Enriched nudges lead to stronger password replacements ... but implement mindfully.
ISSA
(2017)
Werner K. Hauger
,
Martin S. Olivier
Forensic attribution in NoSQL databases.
ISSA
(2017)
Francois Mouton
,
Marcel Teixeira
,
Thomas Meyer
Benchmarking a mobile implementation of the social engineering prevention training tool.
ISSA
(2017)
Ibraheem Frieslaar
,
Barry Irwin
Investigating the electromagnetic side channel leakage from a Raspberry Pi.
ISSA
(2017)
Nkosinathi Mpofu
,
Wynand J. C. van Staden
Evaluating the severity of trust to identity- management-as-a-service.
ISSA
(2017)
2016
Lineo Mejaele
,
Elisha Oketch Ochola
Effect of varying node mobility in the analysis of black hole attack on MANET reactive routing protocols.
ISSA
(2016)
Johannes S. Vorster
,
Renier P. van Heerden
,
Barry Irwin
The pattern-richness of Graphical passwords.
ISSA
(2016)
Noluvuyo Fani
,
Rossouw von Solms
,
Mariana Gerber
A framework towards governing "Bring Your Own Device in SMMEs".
ISSA
(2016)
Wynand J. C. van Staden
,
Etienne van der Poel
Team formation in digital forensics.
ISSA
(2016)
Othoman Elaswad
,
Christian Damsgaard Jensen
Identity management for e-government Libya as a case study.
ISSA
(2016)
Mfundo Masango
,
Francois Mouton
,
Alastair Nottingham
,
Jabu Mtsweni
Context Aware Mobile Application for mobile devices.
ISSA
(2016)
Olanrewaju B. Wojuola
,
Stanley H. Mneney
,
Viranjay M. Srivastava
CDMA in signal encryption and information security.
ISSA
(2016)
Petrus M. J. Delport
,
Mariana Gerber
,
Nader Sohrabi Safa
An interactive visual library model to improve awareness in handling of business information.
ISSA
(2016)
Paulus Swartz
,
Adéle da Veiga
PoPI Act - opt-in and opt-out compliance from a data value chain perspective: A South African insurance industry experiment.
ISSA
(2016)
J. N. Samuel
,
Warren P. Du Plessis
Specific emitter identification for enhanced access control security.
ISSA
(2016)
Yusuf Moosa Motara
,
Barry Irwin
SHA-1 and the Strict Avalanche Criterion.
ISSA
(2016)
Patrick Monamo
,
Vukosi Marivate
,
Bheki Twala
Unsupervised learning for robust Bitcoin fraud detection.
ISSA
(2016)
2016 Information Security for South Africa, ISSA 2016, Johannesburg, South Africa, August 17-18, 2016
ISSA
(2016)
Edwin Donald Frauenstein
,
Stephen V. Flowerday
Social network phishing: Becoming habituated to clicks and ignorant to threats?
ISSA
(2016)
Lauren Rudman
,
Barry Irwin
Dridex: Analysis of the traffic and automatic generation of IOCs.
ISSA
(2016)
Nicholas Scharnick
,
Mariana Gerber
,
Lynn Futcher
Review of data storage protection approaches for POPI compliance.
ISSA
(2016)
Chollette C. Olisah
,
Peter Ogedebe
Recognizing surgically altered faces using local edge gradient Gabor magnitude pattern.
ISSA
(2016)
Ryan De Kock
,
Lynn Ann Futcher
Mobile device usage in higher education institutions in South Africa.
ISSA
(2016)
Alan Herbert
,
Barry Irwin
Adaptable exploit detection through scalable NetFlow analysis.
ISSA
(2016)
2015
Lauren Rudman
,
Barry V. W. Irwin
Characterization and analysis of NTP amplification based DDoS attacks.
ISSA
(2015)
Reijo M. Savola
,
Pekka Savolainen
,
Antti Evesti
,
Habtamu Abie
,
Markus Sihvonen
Risk-driven security metrics development for an e-health IoT application.
ISSA
(2015)
Peter M. Wrench
,
Barry V. W. Irwin
Towards a PHP webshell taxonomy using deobfuscation-assisted similarity analysis.
ISSA
(2015)