Table of Contents - Day 1 - Wednesday 15 August 2012

Stream 1 –
(
Reviewed Papers)

Stream 2 –
(Reviewed Papers)

Digital Forensics

Session chair:

Network security

Session chair:

A conceptual model for digital forensic readiness

Antonio Pooe and Les Labuschagne

A model for partially asynchronous observation of malicious behavior

Mark M. Seeger and Stephen D. Wolthusen

Filtering spam e-mail with generalized additive neural networks

Tiny Du Toit and Hennie Kruger

 

A network telescope perspective of the conficker outbreak

Barry Irwin

A sample of digital forensic quality assurance in the South African Criminal Justice System

Jason Jordaan

 

Towards achieving scalability and interoperability in a triple-domain Grid based environment (3DGBE)

Azeez Nureni Ayofe, Isabella M Venter, Iyamu Tiko and Oyewole A.Stanley

Stream 3 –
(
Reviewed Papers)

Stream 4 –
(Reviewed Papers)

OS and Social network security

Session chair:

Info Security management

Session chair:

ATE: anti-malware technique evaluator

Manuel Corregedor and Sebastiaan Von Solms

 

Guidelines for procedures of a harmonized digital forensic process in network forensics

George Sibiya, HS Venter, Sipho Ngobeni and Thomas Fogwill

Claimed vs obeserved information disclosure on social networking sites

Phumezo Ntlatywa, Reinhardt A. Botha and Bertram Haskins

 

Assessing information security culture:a critical analysis of current approaches

Irene Okere, Johan Van Niekerk and Mariana Carroll