ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2015 Second International Conference on Information Security and Cyber Forensics (InfoSec)
Latest Publications
TOTAL DOCUMENTS
28
(FIVE YEARS 0)
H-INDEX
6
(FIVE YEARS 0)
Published By IEEE
9781467369886
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
SQLi vulnerabilty in education sector websites of Bangladesh
2015 Second International Conference on Information Security and Cyber Forensics (InfoSec)
◽
10.1109/infosec.2015.7435521
◽
2015
◽
Cited By ~ 4
Author(s):
Delwar Alam
◽
Touhid Bhuiyan
◽
Md. Alamgir Kabir
◽
Tanjila Farah
Keyword(s):
Education Sector
Download Full-text
Online signature verification using hybrid features
2015 Second International Conference on Information Security and Cyber Forensics (InfoSec)
◽
10.1109/infosec.2015.7435499
◽
2015
◽
Cited By ~ 7
Author(s):
Madiha Tahir
◽
M. Usman Akram
Keyword(s):
Signature Verification
◽
Hybrid Features
◽
Online Signature
◽
Online Signature Verification
Download Full-text
eDiscovery in South Africa and the challenges it faces
2015 Second International Conference on Information Security and Cyber Forensics (InfoSec)
◽
10.1109/infosec.2015.7435507
◽
2015
◽
Author(s):
Kevin Hughes
◽
Adrie Stander
◽
Val Hooper
Keyword(s):
South Africa
Download Full-text
ECG biometric identification for general population using multiresolution analysis of DWT based features
2015 Second International Conference on Information Security and Cyber Forensics (InfoSec)
◽
10.1109/infosec.2015.7435498
◽
2015
◽
Cited By ~ 9
Author(s):
Muhammad Najam Dar
◽
M. Usman Akram
◽
Anam Usman
◽
Shoab A. Khan
Keyword(s):
General Population
◽
Multiresolution Analysis
◽
Biometric Identification
Download Full-text
Route optimasation based on multidimensional trust evaluation model in mobile ad hoc networks
2015 Second International Conference on Information Security and Cyber Forensics (InfoSec)
◽
10.1109/infosec.2015.7435502
◽
2015
◽
Cited By ~ 1
Author(s):
Antesar M. Shabut
◽
Keshav Dahal
◽
Irfan Awan
◽
Zeeshan Pervez
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Evaluation Model
◽
Trust Evaluation
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Lifelogging and lifeblogging: Privacy issues and influencing factors in South Africa
2015 Second International Conference on Information Security and Cyber Forensics (InfoSec)
◽
10.1109/infosec.2015.7435515
◽
2015
◽
Author(s):
Shabier Parker
◽
Jean-Paul Van Belle
Keyword(s):
South Africa
◽
Influencing Factors
◽
Privacy Issues
Download Full-text
Identifying gaps in IT retail Information Security policy implementation processes
2015 Second International Conference on Information Security and Cyber Forensics (InfoSec)
◽
10.1109/infosec.2015.7435517
◽
2015
◽
Author(s):
Ileen E. van Vuuren
◽
Elmarie Kritzinger
◽
Conrad Mueller
Keyword(s):
Information Security
◽
Policy Implementation
◽
Security Policy
◽
Information Security Policy
◽
Implementation Processes
Download Full-text
A pragmatic approach towards the integration of ICT security awareness into the South African education system
2015 Second International Conference on Information Security and Cyber Forensics (InfoSec)
◽
10.1109/infosec.2015.7435503
◽
2015
◽
Cited By ~ 2
Author(s):
Mvelo Walaza
◽
Marianne Loock
◽
Elmarie Kritzinger
Keyword(s):
South African
◽
Education System
◽
Security Awareness
◽
Pragmatic Approach
◽
The South
◽
African Education
◽
South African Education
◽
Integration Of Ict
◽
Ict Security
Download Full-text
A security model for complex applications based on normative multi-agents system
2015 Second International Conference on Information Security and Cyber Forensics (InfoSec)
◽
10.1109/infosec.2015.7435504
◽
2015
◽
Cited By ~ 2
Author(s):
Haoua Cheribi
◽
Mohamed Kheireddine Kholladi
Keyword(s):
Security Model
◽
Multi Agents
Download Full-text
RFID-based design-theoretical framework for combating police impersonation in South Africa
2015 Second International Conference on Information Security and Cyber Forensics (InfoSec)
◽
10.1109/infosec.2015.7435510
◽
2015
◽
Author(s):
Isong Bassey
◽
Naison Gasela
◽
Ohaeri Ifeooma
◽
Elegbeleye Femi
Keyword(s):
South Africa
◽
Theoretical Framework
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close