ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2015 Information Security for South Africa (ISSA)
Latest Publications
TOTAL DOCUMENTS
39
(FIVE YEARS 0)
H-INDEX
5
(FIVE YEARS 0)
Published By IEEE
9781479977550
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Access control for local personal smart spaces
2015 Information Security for South Africa (ISSA)
◽
10.1109/issa.2015.7335056
◽
2015
◽
Author(s):
Brian Greaves
◽
Marijke Coetzee
Keyword(s):
Access Control
◽
Smart Spaces
Download Full-text
Beacons and their uses for digital forensics purposes
2015 Information Security for South Africa (ISSA)
◽
10.1109/issa.2015.7335074
◽
2015
◽
Author(s):
Luke Lubbe
◽
Martin Oliver
Keyword(s):
Digital Forensics
Download Full-text
The state of database forensic research
2015 Information Security for South Africa (ISSA)
◽
10.1109/issa.2015.7335071
◽
2015
◽
Cited By ~ 5
Author(s):
Werner K. Hauger
◽
Martin S. Olivier
Keyword(s):
The State
◽
Forensic Research
Download Full-text
Adding event reconstruction to a Cloud Forensic Readiness model
2015 Information Security for South Africa (ISSA)
◽
10.1109/issa.2015.7335050
◽
2015
◽
Cited By ~ 4
Author(s):
Victor R. Kebande
◽
H.S. Venter
Keyword(s):
Event Reconstruction
Download Full-text
Data aggregation using homomorphic encryption in wireless sensor networks
2015 Information Security for South Africa (ISSA)
◽
10.1109/issa.2015.7335058
◽
2015
◽
Cited By ~ 6
Author(s):
T.D. Ramotsoela
◽
G.P. Hancke
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Data Aggregation
◽
Homomorphic Encryption
◽
Wireless Sensor
Download Full-text
Intrusion detection in Bluetooth enabled mobile phones
2015 Information Security for South Africa (ISSA)
◽
10.1109/issa.2015.7335048
◽
2015
◽
Cited By ~ 2
Author(s):
Kishor Krishnan Nair
◽
Albert Helberg
◽
Johan Van Der Merwe
Keyword(s):
Intrusion Detection
◽
Mobile Phones
Download Full-text
Characterization and analysis of NTP amplification based DDoS attacks
2015 Information Security for South Africa (ISSA)
◽
10.1109/issa.2015.7335069
◽
2015
◽
Cited By ~ 5
Author(s):
L. Rudman
◽
B. Irwin
Keyword(s):
Ddos Attacks
Download Full-text
Self-sanitization of digital images using steganography
2015 Information Security for South Africa (ISSA)
◽
10.1109/issa.2015.7335073
◽
2015
◽
Author(s):
Tayana Morkel
Keyword(s):
Digital Images
Download Full-text
Location aware mobile device management
2015 Information Security for South Africa (ISSA)
◽
10.1109/issa.2015.7335059
◽
2015
◽
Cited By ~ 2
Author(s):
Jaco du Toit
◽
Ian Ellefsen
Keyword(s):
Mobile Device
◽
Device Management
◽
Mobile Device Management
◽
Location Aware
Download Full-text
Analyzing the security posture of South African websites
2015 Information Security for South Africa (ISSA)
◽
10.1109/issa.2015.7335063
◽
2015
◽
Cited By ~ 2
Author(s):
J. Mtsweni
Keyword(s):
South African
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close