Stream 1 –
(Reviewed
Papers) |
Stream 2 –
(Reviewed
Papers) |
Mobile Security
Session chair: |
Network security
Session chair: |
Data Vulnerability Detection
by Security Testing for Android Applications
Sébastien Salva and Stassia R. Zafimiharisoa |
A Kernel-Driven Framework for
High Performance Internet Routing Simulation
Alan Herbert and Barry Irwin |
Security Steps for Smartphone
Users
Heloise Pieterse and Martin Olivier |
An Analysis of Service
Degradation Attacks against Real-Time MPLS Networks
Abdulrahman Al-Mutairi and Stephen Wolthusen |
Towards Risk-Driven Security
Measurement in Android Smartphone Platforms
Reijo Savola, Antti Evesti, Teemu Väisänen, Taavi Hirvonen and Marko
Kokemäki |
Forensic Entropy Analysis of
Microsoft Windows Storage Volumes
Peter Weston and Stephen Wolthusen
|
Stream 4 –
(Reviewed
Papers) |
Stream 5 –
(Reviewed
Papers) |
Authentication and Critical Information Infrastructures
Session chair: |
Search engines, MANETS, Reputation and Biometrics
Session chair: |
A Conceptual
Opportunity-based Framework to Mitigate the Insider Threat
Keshnee
Padayachee |
The Characteristics of a
Biometric
Helen van de Haar, Darelle van Greunen and Dalenca Pottas |
The identification of
information sources to aid with Critical Information Infrastructure
Protection in developing countries
Jean Mouton and Ian David Ellefsen |
Towards
Reputation-as-a-Service
Channel Hillebrand and Marijke Coetzee |
SNIPPET: Genuine
Knowledge-Based Authentication
Karen Renaud, Dimitris Kennes, Johan Van Niekerk and Joe Maguire |
Democratic Detection of
Malicious Behaviour in MANET: A Voting Process
Elisha Oketch Ochola, Mariki Eloff and Andre John van der Poll
|
Classification of Security
Operation Centers
Pierre Jacobs, Alapan Arnab and Barry Irwin |
Bimodal Biometrics for
Financial Infrastructure Security
Omobayo Esan, Seleman Ngwira and Isaac. O Osunmakinde |