Table of Contents - According to Paper Title

Title Author(s)
A Framework for DNS based detection and mitigation of malware infections on a network  Etienne Stalmans
A Property Based Security Risk Analysis Through Weighted Simulation  Timo Winkelvos, Carsten Rudolph and Jürgen Repp
A Visualization and Modeling Tool for Security Metrics and Measurements Management  Reijo Savola and Petri Heinonen
A web-based information security governance toolbox for small-to-medium enterprises in Southern Africa  Jacques Coertze, Johan Van Niekerk and Rossouw Von Solms
Adding digital forensic readiness to electronic communication using a security monitoring tool  Franscois Van Staden and Hein Venter
An adaptation of the awareness boundary model towards smartphone security  Sean Allam and Stephen Flowerday
An Architecture for Secure Searchable Cloud Storage  Robert Koletka and Andrew Hutchison
An assessment of the role of cultural factors in information security awareness  Hennie Kruger, Stephen Flowerday, Lynette Drevin and Tjaart Steyn
An Evaluation of Lightweight Classification Methods for Identifying Malicious URLs  Shaun Egan
Analysing the fairness of trust-based Mobile Ad Hoc Network protocols  Ivan Daniel Burke and Martin Olivier
cPLC - A Cryptographic Programming Language and Compiler  Endre Bangerter, Stephan Krenn, Matrial Seifriz and Ulrich Ultes-Nitsche
Design of cyber security awareness game utilizing a social media framework  Aubrey Labuschagne, Namosha Veerasamy and Ivan Burke
Detecting Scareware by Mining Variable Length Instruction Sequences  Khurram Shahzad Raja and Lavesson Niklas
Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data  Anne Kayem, Patrick Martin and Selim Akl
Enhancing Digital Business Ecosystem Trust and Reputation with Centrality Measures  Donovan Isherwood and Marijke Coetzee
Exploring the Human Dimension of TETRA  Nico Pieter Fouche and Kerry-Lynn Thomson
Guidelines for the creation of brain compatible cyber security educational material in Moodle 2.0  Rayne Reid, Johan Van Niekerk and Rossouw Von Solms
Implementing Rootkits to Address Operating System Vulnerabilities  Manuel Corregedor and Sebastiaan Von Solms
Information Security Competence Test with Regards to Password Management  Paul Tarwireyi, Stephen Flowerday and Anass Bayaga
Information Security Governance control through comprehensive policy architectures  Rossouw Von Solms, Kerry-Lynn Thomson and Prosecutor Mvikeli Maninjwa
Informed Software Installation Through License Agreement Categorization  Anton Borg, Martin Boldt and Niklas Lavesson
Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness; Stephen Serra and HS Venter
Network Forensics in a Clean-Slate Internet Architecture  Tinus Strauss and Martin Olivier
Online Social Networks: Enhancing user trust through effective controls and identity management  Ryan Galpin and Stephen Flowerday
Secure Cloud Computing: Benefits, Risks and Controls  Mariana Carroll, Paula Kotzé and Alta van der Merwe
Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models  Geoffrey Karokola, Stewart Kowalski, and Louise Yngström
Towards a Digital Forensics Readiness Framework for Public Key Infrastructure Systems  Aleksandar Valjarevic and Hein Venter
Traffic Management in Next Generation Service Provider Networks - Are We There Yet?  Ryan Gavin Goss and Reinhardt A. Botha