Table of Contents - According to Author Name

Author Title
Aleksandar Valjarevic Towards a Digital Forensics Readiness Framework for Public Key Infrastructure Systems 
Alta van der Merwe Secure Cloud Computing: Benefits, Risks and Controls 
Anass Bayaga Information Security Competence Test with Regards to Password Management 
Andrew Hutchison An Architecture for Secure Searchable Cloud Storage 
Anne Kayem Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data 
Anton Borg Informed Software Installation Through License Agreement Categorization 
Aubrey Labuschagne Design of cyber security awareness game utilizing a social media framework 
Carsten Rudolph A Property Based Security Risk Analysis Through Weighted Simulation 
Donovan Isherwood Enhancing Digital Business Ecosystem Trust and Reputation with Centrality Measures 
Endre Bangerter cPLC - A Cryptographic Programming Language and Compiler 
Etienne Stalmans A Framework for DNS based detection and mitigation of malware infections on a network 
Franscois Van Staden Adding digital forensic readiness to electronic communication using a security monitoring tool 
Geoffrey Karokola Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models 
Hein Venter Adding digital forensic readiness to electronic communication using a security monitoring tool 
Hein Venter Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness;
Hein Venter Towards a Digital Forensics Readiness Framework for Public Key Infrastructure Systems 
Hennie Kruger An assessment of the role of cultural factors in information security awareness 
Ivan Burke Design of cyber security awareness game utilizing a social media framework
Ivan Burke Analysing the fairness of trust-based Mobile Ad Hoc Network protocols 
Jacques Coertze A web-based information security governance toolbox for small-to-medium enterprises in Southern Africa 
Johan Van Niekerk A web-based information security governance toolbox for small-to-medium enterprises in Southern Africa 
Johan Van Niekerk Guidelines for the creation of brain compatible cyber security educational material in Moodle 2.0  
Jürgen Repp A Property Based Security Risk Analysis Through Weighted Simulation 
Kerry-Lynn Thomson Exploring the Human Dimension of TETRA 
Kerry-Lynn Thomson Information Security Governance control through comprehensive policy architectures 
Khurram Shahzad Raja Detecting Scareware by Mining Variable Length Instruction Sequences
Lavesson Niklas Detecting Scareware by Mining Variable Length Instruction Sequences 
Louise Yngström Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models  
Lynette Drevin An assessment of the role of cultural factors in information security awareness 
Manuel Corregedor Implementing Rootkits to Address Operating System Vulnerabilities 
Mariana Carroll Secure Cloud Computing: Benefits, Risks and Controls 
Marijke Coetzee Enhancing Digital Business Ecosystem Trust and Reputation with Centrality Measures 
Mariki Eloff Design of cyber security awareness game utilizing a social media framework 
Martial Seifriz cPLC - A Cryptographic Programming Language and Compiler 
Martin Boldt Informed Software Installation Through License Agreement Categorization 
Martin Olivier Analysing the fairness of trust-based Mobile Ad Hoc Network protocols 
Martin Olivier Network Forensics in a Clean-Slate Internet Architecture 
Mvikeli Maninjwa Information Security Governance control through comprehensive policy architectures 
Namosha Veerasamy Design of cyber security awareness game utilizing a social media framework 
Nico Pieter Fouche Exploring the Human Dimension of TETRA 
Niklas Lavesson Informed Software Installation Through License Agreement Categorization 
Patrick Martin Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data 
Paul Tarwireyi Information Security Competence Test with Regards to Password Management 
Paula Kotzé Secure Cloud Computing: Benefits, Risks and Controls 
Petri Heinonen A Visualization and Modeling Tool for Security Metrics and Measurements Management 
Rayne Reid Guidelines for the creation of brain compatible cyber security educational material in Moodle 2.0 
Reijo Savola A Visualization and Modeling Tool for Security Metrics and Measurements Management 
Reinhardt Botha Traffic Management in Next Generation Service Provider Networks - Are We There Yet? 
Renier van Heerden Analysing the fairness of trust-based Mobile Ad Hoc Network protocols 
Robert Koletka An Architecture for Secure Searchable Cloud Storage 
Rossouw Von Solms A web-based information security governance toolbox for small-to-medium enterprises in Southern Africa 
Rossouw Von Solms Guidelines for the creation of brain compatible cyber security educational material in Moodle 2.0 
Rossouw Von Solms Information Security Governance control through comprehensive policy architectures 
Ryan Galpin Online Social Networks: Enhancing user trust through effective controls and identity management 
Ryan Gavin Goss Traffic Management in Next Generation Service Provider Networks - Are We There Yet? 
Sean Allam An adaptation of the awareness boundary model towards smartphone security 
Sebastiaan Von Solms Implementing Rootkits to Address Operating System Vulnerabilities 
Selim Akl Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data 
Shaun Egan An Evaluation of Lightweight Classification Methods for Identifying Malicious URLs 
Stephan Krenn cPLC - A Cryptographic Programming Language and Compiler 
Stephen Flowerday An adaptation of the awareness boundary model towards smartphone security 
Stephen Flowerday An assessment of the role of cultural factors in information security awareness 
Stephen Flowerday Information Security Competence Test with Regards to Password Management 
Stephen Flowerday Online Social Networks: Enhancing user trust through effective controls and identity management 
Stephen Serra Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness
Stewart Kowalski Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models 
Timo Winkelvos A Property Based Security Risk Analysis Through Weighted Simulation 
Tinus Strauss and  Network Forensics in a Clean-Slate Internet Architecture 
Tjaart Steyn An assessment of the role of cultural factors in information security awareness 
Ulrich Ultes-Nitsche cPLC - A Cryptographic Programming Language and Compiler