Cbac4c: Conflict-Based Vm Isolation Control For Cloud Computing | 0 | 0.34 | 2022 |
Analysing Drivers' Preferences for Privacy Enhancing Car-to-Car Communication Systems - A Study from South-Africa. | 0 | 0.34 | 2020 |
Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings | 0 | 0.34 | 2020 |
Identity deception detection: requirements and a model. | 0 | 0.34 | 2019 |
Information Security - 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers | 0 | 0.34 | 2019 |
A Machine Learning Approach to Detect Insider Threats in Emails Caused by Human Behaviours. | 0 | 0.34 | 2019 |
Cyber-security: Identity deception detection on social media platforms. | 2 | 0.40 | 2018 |
Using Machine Learning to Detect Fake Identities: Bots vs Humans. | 4 | 0.41 | 2018 |
Semi-automated Usability Analysis through Eye Tracking | 0 | 0.34 | 2018 |
Identity Deception Detection On Social Media Platforms | 0 | 0.34 | 2017 |
Towards Optimized Security-Aware (O-Sec) Vm Placement Algorithms | 0 | 0.34 | 2017 |
Securing Cloud Computing's Blind-spots using Strong and Risk-based MFA. | 1 | 0.35 | 2016 |
Near-Miss Analysis and the Availability of Software Systems. | 0 | 0.34 | 2016 |
CBAC4C: Conflict Based Allocation Control for Cloud | 0 | 0.34 | 2014 |
Integrated digital forensic process model | 16 | 0.99 | 2013 |
Towards trust and reputation for e-commerce in collectivist rural Africa. | 0 | 0.34 | 2012 |
Evaluating usage control deterrents. | 0 | 0.34 | 2012 |
Improving system availability with near-miss analysis. | 0 | 0.34 | 2012 |
UML Modelling Of Network Warfare Examples. | 0 | 0.34 | 2011 |
Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities. | 0 | 0.34 | 2011 |
Proposing a Digital Operational Forensic Investigation Process . | 0 | 0.34 | 2011 |
A Budget Model for Information Security. | 0 | 0.34 | 2011 |
Inclusive Information Society - Challenges from a South African Rural Primary Healthcare Perspective. | 0 | 0.34 | 2010 |
BC3I - Towards Requirements Specification for Preparing an Information Security Budget. | 0 | 0.34 | 2009 |
Building access control models with attribute exploration | 10 | 0.66 | 2009 |
Considerations Towards a Cyber Crime Profiling System | 3 | 0.53 | 2008 |
Towards a Framework for a Network Warfare Capability | 0 | 0.34 | 2008 |
UML Modelling of Digital Forensic Process Models (DFPMs) | 3 | 0.57 | 2008 |
Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008 | 23 | 3.46 | 2008 |
Web Services Access Control Architecture Incorporating Trust | 3 | 0.53 | 2007 |
An Aspect-Oriented Approach to Enhancing Multilevel Security with Usage Control: An Experience Report | 1 | 0.37 | 2007 |
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis | 0 | 0.34 | 2007 |
New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa | 45 | 4.73 | 2007 |
Using IT Benchmarking Principles to Design an Information Security Benchmark Model | 0 | 0.34 | 2006 |
Analysis of Web Proxy Logs | 2 | 0.45 | 2006 |
Framework for a Digital Forensic Investigation | 19 | 1.75 | 2006 |
Applying Machine Trust Models to Forensic Investigations | 3 | 0.48 | 2006 |
A Framework for Web Services Trust | 2 | 0.39 | 2006 |
On lattices in access control models | 2 | 0.48 | 2006 |
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa | 31 | 3.61 | 2006 |
Autonomous Trust For Web Services | 3 | 0.43 | 2005 |
Exploring Forensic Data with Self-Organizing Maps | 9 | 0.94 | 2005 |
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa | 34 | 7.02 | 2005 |
A new Access Control model based on the Chinese Wall Security Policy Model | 1 | 0.38 | 2005 |
Metadata for trust in service-oriented architectures | 0 | 0.34 | 2005 |
An overview of image steganography | 52 | 3.39 | 2005 |
Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment | 0 | 0.34 | 2005 |
Foiling an Attack - Defeating IPSec Tunnel Fingerprinting | 0 | 0.34 | 2005 |
An access control framework for web services | 1 | 0.41 | 2005 |
Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics | 4 | 0.45 | 2004 |