Home
Preface
Introduction and Focus
Conference Committee
Review Committee
Review Process
Peer-reviewed Papers
Day 1 Day 2 Day 3
Research-in-Progress Papers
Invited Speakers
Sponsors & Organisers
Contact
Table of Contents - Day 2 - Thursday 16 August 2012
Stream 5 – (Reviewed Papers)
Stream 6 –
(Reviewed Papers)
Authentication
Session chair:
Security mechanisms
Gamifying authentication
Christien Kroeze and Martin Olivier
Measuring semantic similarity between digital forensics terminologies using web search engines
Nickson M. Karie and HS Venter
Tag group authentication using bit-collisions
Xuefei Leng, Gerhard Hancke, Keith Mayes and Konstantinos Markantonakis
On anonymizing social network graphs
Anne Kayem
Strategies for security measurement objective decomposition
Reijo Savola
The enemy within: an e-learning based information security awareness process
Tapiwa Gundu and Stephen Flowerday
Stream 7 - (Reviewed Papers)
Stream 8 –
Botnets
Digital forensics
Android botnets on the rise: trends and characteristics
Heloise Pieterse and Martin Olivier
Properties of a similarity preserving hash function and their realization in the similarity digest sdhash
Frank Breitinger and Harald Baier
Geo-spatial autocorrelation as a metric for the detection of fast-flux botnet domains
Etienne Stalmans, Barry Irwin and Samuel Oswald Hunter
On forensics: a silent sms attack
Neil Croft