Cbac4c: Conflict-Based Vm Isolation Control For Cloud Computing | 0 | 0.34 | 2022 |
Proactive Forensics: Keystroke Logging from the Cloud as Potential Digital Evidence for Forensic Readiness Purposes | 0 | 0.34 | 2020 |
Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings | 0 | 0.34 | 2020 |
Information Security - 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers | 0 | 0.34 | 2019 |
Digital behavioral-fingerprint for user attribution in digital forensics: Are we there yet? | 0 | 0.34 | 2019 |
Implementing The Harmonized Model For Digital Evidence Admissibility Assessment | 0 | 0.34 | 2019 |
Polychronicity tendency-based online behavioral signature | 0 | 0.34 | 2019 |
A Conceptual Model for Consent Management in South African e-Health Systems for Privacy Preservation. | 0 | 0.34 | 2019 |
The Current State of Electronic Consent Systems in e-Health for Privacy Preservation. | 0 | 0.34 | 2018 |
Towards an Integrated Digital Forensic Investigation Framework for an IoT-Based Ecosystem | 0 | 0.34 | 2018 |
Performance Costs of Software Cryptography in Securing New-Generation Internet of Energy Endpoint Devices. | 4 | 0.44 | 2018 |
A Digital Forensic Readiness Architecture for Online Examinations | 0 | 0.34 | 2018 |
Digital Forensic Readiness Framework for Ransomware Investigation | 1 | 0.37 | 2018 |
A Model for Digital Evidence Admissibility Assessment. | 0 | 0.34 | 2017 |
High-level online user attribution model based on human Polychronic-Monochronic tendency | 1 | 0.36 | 2017 |
A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness | 0 | 0.34 | 2017 |
Understanding the Level of Compliance by South African Institutions to the Protection of Personal Information (POPI) Act. | 0 | 0.34 | 2016 |
Social engineering attack examples, templates and scenarios. | 8 | 0.68 | 2016 |
Proof of Concept of the Online Neighbourhood Watch System. | 0 | 0.34 | 2015 |
Locating and Tracking Digital Objects in the Cloud. | 0 | 0.34 | 2015 |
Necessity for ethics in social engineering research | 3 | 0.44 | 2015 |
Social Engineering Attack Detection Model: SEADMv2. | 1 | 0.37 | 2015 |
Introduction | 0 | 0.34 | 2014 |
Towards a Model for acquiring Digital Evidence using Mobile Devices. | 1 | 0.48 | 2014 |
The architecture of a digital forensic readiness management system | 9 | 0.53 | 2013 |
An Ontological Framework for a Cloud Forensic Environment. | 0 | 0.34 | 2013 |
Digital forensic readiness in a cloud environment | 3 | 0.40 | 2013 |
A Harmonized Process Model for Digital Forensic Investigation Readiness. | 0 | 0.34 | 2013 |
Selection and ranking of remote hosts for digital forensic investigation in a Cloud environment. | 0 | 0.34 | 2013 |
System-Generated Digital Forensic Evidence in Graphic Design Applications. | 0 | 0.34 | 2013 |
Implementation guidelines for a harmonised digital forensic investigation readiness process model. | 1 | 0.36 | 2013 |
Implementing Forensic Readiness Using Performance Monitoring Tools. | 1 | 0.37 | 2012 |
Development of Cognitive Functioning Psychological Measures for the SEADM. | 4 | 0.67 | 2012 |
Finding Digital Forensic Evidence in Graphic Design Applications. | 0 | 0.34 | 2012 |
The Modelling of a Digital Forensic Readiness Approach for Wireless Local Area Networks. | 1 | 0.35 | 2012 |
Towards Solving the Identity Challenge faced by Digital Forensics. | 0 | 0.34 | 2012 |
Guidelines For Procedures Of A Harmonised Digital Forensic Process In Network Forensics | 4 | 0.51 | 2012 |
Combating Mobile Spam through Botnet Detection using Artificial Immune Systems. | 3 | 0.37 | 2012 |
Harmonised Digital Forensic Investigation Process Model | 7 | 0.67 | 2012 |
Detecting Mobile Spam Botnets Using Artificial immune Systems. | 6 | 0.63 | 2011 |
Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities. | 0 | 0.34 | 2011 |
Adding digital forensic readiness to electronic communication using a security monitoring tool. | 0 | 0.34 | 2011 |
Requirements for wireless sensor networks in order to achieve digital forensic readiness. | 1 | 0.38 | 2011 |
A Budget Model for Information Security. | 0 | 0.34 | 2011 |
State of the Art of Digital Forensic Techniques. | 0 | 0.34 | 2011 |
A prototype for achieving digital forensic readiness on wireless sensor networks | 5 | 0.49 | 2011 |
A Forensic Readiness Model for Wireless Networks | 4 | 0.41 | 2010 |
Adding digital forensic readiness to the email trace header. | 1 | 0.37 | 2010 |
Mobile botnet detection using network forensics | 14 | 0.76 | 2010 |
The Design of a Wireless Forensic Readiness Model(WFRM). | 0 | 0.34 | 2009 |