Table of Contents - Day 2 - Thursday 16 August 2012

Stream 5  
(
Reviewed Papers)

Stream 6 –

(Reviewed Papers)

Authentication

Session chair:

Security mechanisms

Session chair:

Gamifying authentication

Christien Kroeze and Martin Olivier

 

Measuring semantic similarity between digital forensics terminologies using web search engines

Nickson M. Karie and HS Venter

Tag group authentication using bit-collisions

Xuefei Leng, Gerhard Hancke, Keith Mayes and Konstantinos Markantonakis

On anonymizing social network graphs

Anne Kayem

Strategies for security measurement objective decomposition

Reijo Savola

The enemy within: an e-learning based information security awareness process

Tapiwa Gundu and Stephen Flowerday

 

Stream 7 -
(
Reviewed Papers)

Stream 8 –

(Reviewed Papers)

Botnets

Session chair:

Digital forensics

Session chair:

Android botnets on the rise: trends and characteristics

Heloise Pieterse and Martin Olivier

 

Properties of a similarity preserving hash function and their realization in the similarity digest sdhash

Frank Breitinger and Harald Baier

 

Geo-spatial autocorrelation as a metric for the detection of fast-flux botnet domains

Etienne Stalmans, Barry Irwin and Samuel Oswald Hunter

 

On forensics: a silent sms attack

Neil Croft