Table of Contents - Day 2 - Thursday 15 August 2013

Stream 1 –
(
Reviewed Papers)

Stream 2 –
(Reviewed Papers)

Mobile Security

Session chair:

Network security

Session chair:

Data Vulnerability Detection by Security Testing for Android Applications

Sébastien Salva and Stassia R. Zafimiharisoa

A Kernel-Driven Framework for High Performance Internet Routing Simulation

Alan Herbert and Barry Irwin

Security Steps for Smartphone Users

Heloise Pieterse and Martin Olivier

An Analysis of Service Degradation Attacks against Real-Time MPLS Networks

Abdulrahman Al-Mutairi and Stephen Wolthusen

Towards Risk-Driven Security Measurement in Android Smartphone Platforms

Reijo Savola, Antti Evesti, Teemu Väisänen, Taavi Hirvonen and Marko Kokemäki

Forensic Entropy Analysis of Microsoft Windows Storage Volumes

Peter Weston and Stephen Wolthusen

 

Stream 4 –
(
Reviewed Papers)

Stream 5 –
(Reviewed Papers)

Authentication and Critical Information Infrastructures

Session chair:

Search engines, MANETS, Reputation and Biometrics

Session chair:

A Conceptual Opportunity-based Framework to Mitigate the Insider Threat

Keshnee Padayachee

The Characteristics of a Biometric

Helen van de Haar, Darelle van Greunen and Dalenca Pottas

The identification of information sources to aid with Critical Information Infrastructure Protection in developing countries

Jean Mouton and Ian David Ellefsen

Towards Reputation-as-a-Service

Channel Hillebrand and Marijke Coetzee

SNIPPET: Genuine Knowledge-Based Authentication

Karen Renaud, Dimitris Kennes, Johan Van Niekerk and Joe Maguire

Democratic Detection of Malicious Behaviour in MANET: A Voting Process

Elisha Oketch Ochola, Mariki Eloff and Andre John van der Poll

 

Classification of Security Operation Centers

Pierre Jacobs, Alapan Arnab and Barry Irwin

Bimodal Biometrics for Financial Infrastructure Security

Omobayo Esan, Seleman Ngwira and Isaac. O Osunmakinde