A Framework for DNS
based detection and mitigation of malware infections on a
network |
Etienne Stalmans |
A Property Based
Security Risk Analysis Through Weighted Simulation |
Timo Winkelvos, Carsten Rudolph and Jürgen Repp |
A Visualization and
Modeling Tool for Security Metrics and Measurements Management |
Reijo Savola and Petri Heinonen |
A web-based information
security governance toolbox for small-to-medium enterprises in
Southern Africa |
Jacques Coertze, Johan Van Niekerk and Rossouw Von Solms |
Adding digital forensic
readiness to electronic communication using a security
monitoring tool |
Franscois Van Staden and Hein Venter |
An adaptation of the
awareness boundary model towards smartphone security |
Sean Allam and Stephen Flowerday |
An Architecture for
Secure Searchable Cloud Storage |
Robert Koletka and Andrew Hutchison |
An assessment of the
role of cultural factors in information security awareness |
Hennie Kruger, Stephen Flowerday, Lynette Drevin and Tjaart
Steyn |
An Evaluation of
Lightweight Classification Methods for Identifying Malicious
URLs |
Shaun Egan |
Analysing the fairness
of trust-based Mobile Ad Hoc Network protocols |
Ivan Daniel Burke and Martin Olivier |
cPLC - A Cryptographic
Programming Language and Compiler |
Endre Bangerter, Stephan Krenn, Matrial Seifriz and Ulrich
Ultes-Nitsche |
Design of cyber security
awareness game utilizing a social media framework |
Aubrey Labuschagne, Namosha Veerasamy and Ivan Burke |
Detecting Scareware by
Mining Variable Length Instruction Sequences |
Khurram Shahzad Raja and Lavesson Niklas |
Efficient Enforcement of
Dynamic Access Control Policies for Outsourced Data |
Anne Kayem, Patrick Martin and Selim Akl |
Enhancing Digital
Business Ecosystem Trust and Reputation with Centrality
Measures |
Donovan Isherwood and Marijke Coetzee |
Exploring the Human
Dimension of TETRA |
Nico Pieter Fouche and Kerry-Lynn Thomson |
Guidelines for the
creation of brain compatible cyber security educational material
in Moodle 2.0 |
Rayne Reid, Johan Van Niekerk and Rossouw Von Solms |
Implementing Rootkits to
Address Operating System Vulnerabilities |
Manuel Corregedor and Sebastiaan Von Solms |
Information Security
Competence Test with Regards to Password Management |
Paul Tarwireyi, Stephen Flowerday and Anass Bayaga |
Information Security
Governance control through comprehensive policy architectures |
Rossouw Von Solms, Kerry-Lynn Thomson and Prosecutor Mvikeli
Maninjwa |
Informed Software
Installation Through License Agreement Categorization |
Anton Borg, Martin Boldt and Niklas Lavesson |
Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness; |
Stephen Serra and HS Venter |
Network Forensics in a
Clean-Slate Internet Architecture |
Tinus Strauss and Martin Olivier |
Online Social Networks:
Enhancing user trust through effective controls and identity
management |
Ryan Galpin and Stephen Flowerday |
Secure Cloud Computing:
Benefits, Risks and Controls |
Mariana Carroll, Paula Kotzé and Alta van der Merwe |
Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models |
Geoffrey Karokola, Stewart Kowalski, and Louise Yngström |
Towards a Digital
Forensics Readiness Framework for Public Key Infrastructure
Systems |
Aleksandar Valjarevic and Hein Venter |
Traffic Management in
Next Generation Service Provider Networks - Are We There Yet? |
Ryan Gavin Goss and Reinhardt A. Botha |