​
Login / Signup
InfoSec
2015
2015
2015
Keyphrases
Publications
2015
Mustafa Hassan Saad
,
Ahmed Serageldin
,
Goda Ismaeel Salama
Android spyware disease and medication.
InfoSec
(2015)
Eric Amankwa
,
Marianne Loock
,
Elmarie Kritzinger
Enhancing information security education and awareness: Proposed characteristics for a model.
InfoSec
(2015)
Shabier Parker
,
Jean-Paul Van Belle
Lifelogging and lifeblogging: Privacy issues and influencing factors in South Africa.
InfoSec
(2015)
Bassey Isong
,
Naison Gasela
,
Ifeoma U. Ohaeri
,
Elegbeleye Femi
RFID-based design-theoretical framework for combating police impersonation in South Africa.
InfoSec
(2015)
Mostafa Doroudian
,
Narges Arastouie
,
Mohammad Talebi
,
Ali Reza Ghanbarian
Multilayered database intrusion detection system for detecting malicious behaviors in big data transaction.
InfoSec
(2015)
T. Charles
,
M. Pollock
Digital forensic investigations at universities in South Africa.
InfoSec
(2015)
Reema Al Mushcab
,
Pavel Gladyshev
The significance of different backup applications in retrieving social networking forensic artifacts from Android-based mobile devices.
InfoSec
(2015)
Haoua Cheribi
,
Mohamed-Khireddine Kholladi
A security model for complex applications based on normative multi-agents system.
InfoSec
(2015)
Zahra Waheed
,
M. Usman Akram
,
Amna Waheed
,
Arslan Shaukat
Robust extraction of blood vessels for retinal recognition.
InfoSec
(2015)
Fayyaadh Parker
,
Jacques Ophoff
,
Jean-Paul Van Belle
,
Ross Karia
Security awareness and adoption of security controls by smartphone users.
InfoSec
(2015)
Mvelo Walaza
,
Marianne Loock
,
Elmarie Kritzinger
A pragmatic approach towards the integration of ICT security awareness into the South African education system.
InfoSec
(2015)
Ruilin Zhu
,
Lech J. Janczewski
Typology of information systems security research: A methodological perspective.
InfoSec
(2015)
Muhammad Najam Dar
,
M. Usman Akram
,
Anam Usman
,
Shoab Ahmad Khan
ECG biometric identification for general population using multiresolution analysis of DWT based features.
InfoSec
(2015)
Madiha Tahir
,
M. Usman Akram
Online signature verification using hybrid features.
InfoSec
(2015)
Ar Kar Kyaw
,
Yuzhu Chen
,
Justin Joseph
Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2.
InfoSec
(2015)
Walid Al-Ahmad
,
Basil Mohammed
A code of practice for effective information security risk management using COBIT 5.
InfoSec
(2015)
Wenli Shang
,
Ming Wan
,
Peng Zeng
,
Quansheng Qiao
Research on self-learning method on generation and optimization of industrial firewall rules.
InfoSec
(2015)
2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015
InfoSec
(2015)
Nyalleng Moorosi
,
Vukosi Marivate
Privacy in mining crime data from social Media: A South African perspective.
InfoSec
(2015)
Lineo Mejaele
,
Elisha Oketch Ochola
Analysing the impact of black hole attack on DSR-based MANET: The hidden network destructor.
InfoSec
(2015)
Antesar M. Shabut
,
Keshav P. Dahal
,
Irfan Awan
,
Zeeshan Pervez
Route optimasation based on multidimensional trust evaluation model in mobile ad hoc networks.
InfoSec
(2015)
Muhammad Sarfraz
,
Syed M. A. J. Rizvi
An intelligent system for Online Signature Verification.
InfoSec
(2015)
Topside E. Mathonsi
Optimized handoff and secure roaming model for wireless networks.
InfoSec
(2015)
Ar Kar Kyaw
,
Franco Sioquim
,
Justin Joseph
Dictionary attack on Wordpress: Security and forensic analysis.
InfoSec
(2015)
Michael Hopkins
,
Ali Dehghantanha
Exploit Kits: The production line of the Cybercrime economy?
InfoSec
(2015)
Delwar Alam
,
Touhid Bhuiyan
,
Md. Alamgir Kabir
,
Tanjila Farah
SQLi vulnerabilty in education sector websites of Bangladesh.
InfoSec
(2015)
Kevin Hughes
,
Adrie Stander
,
Val A. Hooper
eDiscovery in South Africa and the challenges it faces.
InfoSec
(2015)
Ileen E. van Vuuren
,
Elmarie Kritzinger
,
Conrad Mueller
Identifying gaps in IT retail Information Security policy implementation processes.
InfoSec
(2015)
Kennedy Njenga
,
Sifiso Ndlovu
Mobile banking and information security risks: Demand-side predilections of South African lead-users.
InfoSec
(2015)