掌桥科研
一站式科研服务平台
科技查新
收录引用
专题文献检索
外文数据库(机构版)
更多产品
首页
成为会员
我要充值
退出
我的积分:
中文会员
开通
中文文献批量获取
外文会员
开通
外文文献批量获取
我的订单
会员中心
我的包量
我的余额
登录/注册
文献导航
中文期刊
>
中文会议
>
中文学位
>
中国专利
>
外文期刊
>
外文会议
>
外文学位
>
外国专利
>
外文OA文献
>
外文科技报告
>
中文图书
>
外文图书
>
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
美国国防部AD报告
美国能源部DE报告
美国航空航天局NASA报告
美国商务部PB报告
外军国防科技报告
美国国防部
美国参联会主席指示
美国海军
美国空军
美国陆军
美国海军陆战队
美国国防技术信息中心(DTIC)
美军标
美国航空航天局(NASA)
战略与国际研究中心
美国国土安全数字图书馆
美国科学研究出版社
兰德公司
美国政府问责局
香港科技大学图书馆
美国海军研究生院图书馆
OALIB数据库
在线学术档案数据库
数字空间系统
剑桥大学机构知识库
欧洲核子研究中心机构库
美国密西根大学论文库
美国政府出版局(GPO)
加利福尼亚大学数字图书馆
美国国家学术出版社
美国国防大学出版社
美国能源部文献库
美国国防高级研究计划局
美国陆军协会
美国陆军研究实验室
英国空军
美国国家科学基金会
美国战略与国际研究中心-导弹威胁网
美国科学与国际安全研究所
法国国际关系战略研究院
法国国际关系研究所
国际宇航联合会
美国防务日报
国会研究处
美国海运司令部
北约
盟军快速反应部队
北约浅水行动卓越中心
北约盟军地面部队司令部
北约通信信息局
北约稳定政策卓越中心
美国国会研究服务处
美国国防预算办公室
美国陆军技术手册
一般OA
科技期刊论文
科技会议论文
图书
科技报告
科技专著
标准
其它
美国卫生研究院文献
分子生物学
神经科学
药学
外科
临床神经病学
肿瘤学
细胞生物学
遗传学
公共卫生&环境&职业病
应用微生物学
全科医学
免疫学
动物学
精神病学
兽医学
心血管
放射&核医学&医学影像学
儿科
医学进展
微生物学
护理学
生物学
牙科&口腔外科
毒理学
生理学
医院管理
妇产科学
病理学
生化技术
胃肠&肝脏病学
运动科学
心理学
营养学
血液学
泌尿科学&肾病学
生物医学工程
感染病
生物物理学
矫形
外周血管病
药物化学
皮肤病学
康复学
眼科学
行为科学
呼吸学
进化生物学
老年医学
耳鼻喉科学
发育生物学
寄生虫学
病毒学
医学实验室检查技术
生殖生物学
风湿病学
麻醉学
危重病护理
生物材料
移植
医学情报
其他学科
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
主题
主题
题名
作者
关键词
摘要
高级搜索 >
外文期刊
外文会议
外文学位
外国专利
外文图书
外文OA文献
中文期刊
中文会议
中文学位
中国专利
中文图书
外文科技报告
清除
历史搜索
清空历史
首页
>
外文会议
>
Information Security for South Africa Conference
Information Security for South Africa Conference
召开年:
2013
召开地:
Johannesburg(ZA)
出版时间:
-
会议文集:
-
会议论文
热门论文
全部论文
全选(
0
)
清除
导出
1.
ATE: Anti-malware technique evaluator
机译:
ATE:反恶意软件技术评估员
作者:
Corregedor Manuel
;
Von Solms Sebastiaan
会议名称:
《Information Security for South Africa Conference》
|
2012年
2.
Gamifying authentication
机译:
赌博身份验证
作者:
Kroeze Christien
;
Olivier Martin S
会议名称:
《Information Security for South Africa Conference》
|
2012年
3.
Tag Group Authentication Using Bit-Collisions
机译:
使用位冲突标记组身份验证
作者:
Leng X.
;
Hancke G.P.
;
Mayes K.E.
;
Markantonakis K.
会议名称:
《Information Security for South Africa Conference》
|
2012年
4.
On anonymizing social network graphs
机译:
关于匿名社交网络图
作者:
Kayem Anne V.D.M.
;
Deshai Azhar
;
Hammer Stuart
会议名称:
《Information Security for South Africa Conference》
|
2012年
5.
Filtering spam e-mail with Generalized Additive Neural Networks
机译:
通过广义添加剂神经网络过滤垃圾邮件电子邮件
作者:
du Toit Tiny
;
Kruger Hennie
会议名称:
《Information Security for South Africa Conference》
|
2012年
6.
The adversarial threat posed by the NSA to the integrity of the internet
机译:
NSA构成的对抗威胁到互联网的完整性
作者:
Naude Jared
;
Drevin Lynette
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
Internet;
security of data;
Five Eyes;
Internet integrity;
Internet security;
NSA Contractor;
National Security Agency;
adversarial threat;
encryption algorithms;
mass surveillance;
security protocols;
Artificial neural networks;
Encryption;
Government;
Lead;
Surveillance;
NSA;
awareness;
mass surveillance;
security threats;
7.
Evaluation and analysis of a software prototype for guidance and implementation of a standardized digital forensic investigation process
机译:
标准化数字法医调查过程的指导和实施软件原型的评估与分析
作者:
Ingels Melissa
;
Valjarevic Aleksandar
;
Venter Hein S.
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
digital forensics;
software performance evaluation;
software prototyping;
software quality;
ISO/lEC 27043:2015;
SUMI;
digital forensic investigation process;
software prototype analysis;
software prototype evaluation;
software quality;
software usability evaluation;
software usability measurement inventory;
Cryptography;
Libraries;
Organizations;
Software;
Standards organizations;
Yttrium;
ISO/IEC 27043;
digital forensic investigation process model;
digital forensics;
implementation prototype;
software evaluation;
standardization;
8.
A framework of opportunity-reducing techniques to mitigate the insider threat
机译:
减少内幕威胁的机会减少技术框架
作者:
Padayachee Keshnee
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
computer crime;
criminology theory;
extant opportunity-reducing techniques;
insider threat mitigation;
situational crime prevention theory;
unified framework;
Computer crime;
Computers;
Mobile communication;
Monitoring;
Abuse;
Insider Threat;
crime involving computers;
9.
Mapping ‘Security Safeguard’ Requirements in a data privacy legislation to an international privacy framework: A compliance methodology
机译:
在数据隐私立法中映射“安全保障”要求到国际隐私框架:一项合规方法
作者:
Govender I.
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
data privacy;
personal information systems;
American framework;
Canadian framework;
POPI address;
South Africa data privacy legislation;
address GAPP;
generally accepted privacy principle;
international data privacy legislation;
international privacy laws;
protection-of-personal information bill;
security safeguard;
Privacy;
Data Privacy;
GAPP;
Information Security;
POPI;
Personal Information;
framework;
mapping;
methodology;
10.
SMT-constrained symbolic execution engine for integer overflow detection in C code
机译:
用于C代码中整数溢出检测的SMT约束符号执行引擎
作者:
Muntean Paul
;
Rahman Mustafizur
;
Ibing Andreas
;
Eckert Claudia
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
C++ language;
program debugging;
program testing;
safety-critical software;
C code;
C language semantics;
C language specification rules;
C programs;
C++ programs;
CWE-190;
Eclipse plug-in;
KLOC;
NIST Juliet test suite;
National Institute of Standards and Technology;
SMT-constrained symbolic execution engine;
bug detection;
bug filtering;
dynamic tools;
false negatives;
false positives;
formal rules;
integer overflow checker;
integer overflow error detection;
integer types;
open source C test case;
open source C++ test case;
static tools;
symbolic function models;
Lead;
Yttrium;
context-sensitive analysis;
information security;
software vulnerability;
11.
Access control for local personal smart spaces
机译:
用于当地个人智能空间的访问控制
作者:
Greaves Brian
;
Coetzee Marijke
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
authorisation;
LPSS access control framework;
LPSS environments;
Wi-Fi Direct;
access control enforcement;
access point-less means;
computer systems;
device-to-device networks;
global policy rules;
information sharing;
local personal smart spaces;
local policy rules;
peer-to-peer Services;
secure resource sharing;
security challenges;
smart space personalisation;
Context;
Security;
access control;
context;
policy;
smart space;
trust;
12.
AFA-RFID: Physical layer authentication for passive RFID tags
机译:
AFA-RFID:被动RFID标签的物理层认证
作者:
Smith Gregory Stuart
;
Coetzee Marijke
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
radiofrequency identification;
security of data;
AFA-RFID;
analogue computing principle;
analogue fingerprint;
information security;
passive RFID tag;
physical layer authentication;
radiofrequency identification;
ubiquitous technology;
Authentication;
Computers;
Fingerprint recognition;
Information security;
Passive RFID tags;
Physical layer;
analogue fingerprint;
authentication;
passive RFID tag;
physical layer security;
13.
Prerequisites for building a Computer Security Incident Response capability
机译:
构建计算机安全事件响应能力的先决条件
作者:
Mooi Roderick
;
Botha Reinhardt A.
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
business data processing;
security of data;
CSIRT authority;
CSIRT constituency;
CSIRT environment;
CSIRT funding;
CSIRT legal considerations;
authoritative CSIRT literature;
business requirements;
computer security incident response capability;
Buildings;
Computer crime;
Information security;
NIST;
CERT;
CSIRT;
establishing requirements;
incident response;
security team;
14.
A formal qualitative risk management approach for IT security
机译:
IT安全的正式定性风险管理方法
作者:
Mahopo Bessy
;
Abdullah Hanifa
;
Mujinga Mathias
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
formal specification;
risk management;
security of data;
IT security attack;
IT security risk management;
formal qualitative risk management approach;
formal risk management tool;
formal risk-based approach;
information technology security;
robust risk analysis;
robust risk assessment process;
Analytical models;
Europe;
Market research;
Monitoring;
Security;
TV;
IT security risk analysis;
IT security risk management;
15.
Location aware mobile device management
机译:
位置感知移动设备管理
作者:
du Toit Jaco
;
Ellefsen Ian
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
internetworking;
intranets;
mobile computing;
Neo device control;
Neo device management;
Neo model;
black box;
business application;
corporate company;
employee desk;
gateway controllers;
location-aware mobile device management;
mobile device location;
mutual authentication;
network security;
secure containers;
security controls;
security requirements;
sensitive information;
system-focused security;
Communication system security;
Containers;
Logic gates;
Mobile communication;
Virtual private networks;
Wireless communication;
Wireless sensor networks;
mobile;
network;
security;
16.
Towards a digital forensic science
机译:
走向数字法医科学
作者:
Olivier Martin S.
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
digital forensics;
law;
US Department of Justice;
computing concepts;
digital evidence;
digital forensic science;
error rates;
law;
science conflation;
scientific working group;
Blood;
Context;
Digital forensics;
Error analysis;
Multimedia communication;
Psychology;
Digital forensic science;
17.
Biometric identification: Are we ethically ready?
机译:
生物识别:我们是道德准备好的吗?
作者:
Renaud Karen
;
Hoskins Andrew
;
von Solms Rossouw
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
biometrics (access control);
biometric identification;
cartographic locators;
holistic approach;
integrative biology;
reductionist approach;
Databases;
Fingerprint recognition;
Iris recognition;
Physiology;
biometrics;
ethics;
security;
18.
Intrusion detection in Bluetooth enabled mobile phones
机译:
支持蓝牙的移动电话中的入侵检测
作者:
Nair Kishor Krishnan
;
Helberg Albert
;
Van Der Merwe Johan
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
Bluetooth;
computer network security;
smart phones;
BLA mechanism;
Bluetooth enabled mobile phones;
Bluetooth logging agent;
Bluetooth message logging module;
built-in security modes;
built-in security policies;
information protection;
information storage;
intrusion detection module;
intrusion verification module;
mobile phone user level;
remote device;
security improvement;
security limitations;
security mechanism;
security risk reduction;
security vulnerabilities;
Monitoring;
Radiation detectors;
BD_ADDRESS;
BLA;
Bluetooth;
IDS;
MPUI;
Mobile phones;
PIN;
Pairing;
Vulnerability;
19.
Data aggregation using homomorphic encryption in wireless sensor networks
机译:
无线传感器网络中使用同态加密的数据聚合
作者:
Ramotsoela T.D.
;
Hancke G.P.
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
cryptography;
telecommunication power management;
telecommunication traffic;
wireless sensor networks;
Domingo-Ferrer encryption;
data aggregation;
energy consumption reduction;
homomorphic encryption;
information aggregation;
network size;
network traffic reduction;
packet size;
plaintext aggregation;
wireless sensor networks;
Communication system security;
Cryptography;
Monitoring;
Performance evaluation;
Wireless communication;
Wireless sensor networks;
Aggregation;
homomorphic encryption;
network security;
wireless sensor networks;
20.
Towards a PHP webshell taxonomy using deobfuscation-assisted similarity analysis
机译:
使用Deobfuscation辅助相似性分析对PHP WebShell分类
作者:
Wrench Peter M.
;
Irwin Barry V. W.
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
Internet;
data visualisation;
invasive software;
pattern clustering;
pattern matching;
reverse engineering;
PHP Webshell taxonomy;
PHP-based Web shells;
PHP-based remote access Trojans;
Web shells;
Web-based malware;
Webshell software;
c99;
clustering algorithms;
deobfuscation-assisted similarity analysis;
led malware researchers;
r57;
reverse engineer;
reverse idiomatic obfuscation;
seminal shells;
shell analysis;
shell classification;
shell tracking;
signature matching;
visualisation techniques;
Algorithm design and analysis;
Arrays;
Databases;
Feature extraction;
Malware;
Software;
Taxonomy;
21.
Reviewers
机译:
审稿人员
作者:
(missing)
会议名称:
《Information Security for South Africa Conference》
|
2011年
22.
On forensics: A silent SMS attack
机译:
关于取证:一个沉默的短信攻击
作者:
Croft Neil
会议名称:
《Information Security for South Africa Conference》
|
2012年
23.
Characterization and analysis of NTP amplification based DDoS attacks
机译:
基于NTP扩增的DDOS攻击的特征与分析
作者:
Rudman L.
;
Irwin B.
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
computer network security;
protocols;
DDoS attacks;
NTP amplification;
South Africa;
TTL values;
distributed denial-of-service attacks;
network time protocol;
operating system;
source IP address;
time-to-live values;
Computer crime;
Computer science;
IP networks;
Ports (Computers);
Protocols;
Routing;
Servers;
denial of service;
network security;
network time protocol;
24.
Beacons and their uses for digital forensics purposes
机译:
信标及其用于数字取证的用途
作者:
Lubbe Luke
;
Oliver Martin
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
Web sites;
digital forensics;
Web bug;
Webpage;
World Wide Web;
automated Web beacon scanning;
digital forensics;
hidden resource reference;
human analysis;
third party source;
Browsers;
DNA;
Digital forensics;
Fingerprint recognition;
IP networks;
Internet;
Servers;
Digital forensics;
Web analytics;
Web beacons;
Web bugs;
25.
Risk-driven security metrics development for an e-health IoT application
机译:
风险驱动的电子健康IOT应用程序的安全指标开发
作者:
Savola Reijo M.
;
Savolainen Pekka
;
Evesti Antti
;
Abie Habtamu
;
Sihvonen Markus
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
Internet of Things;
data privacy;
decision making;
diseases;
geriatrics;
health care;
risk management;
security of data;
chronic disease self-care;
e-health Internet-of-Things applications;
e-health IoT application;
elderly person day-to-day support;
privacy;
risk-driven security decision-making;
risk-driven security metrics development;
security controls;
security objective decomposition;
Artificial intelligence;
Android;
risk analysis;
security effectiveness;
security metrics;
26.
State-on-nationals' electronic communication surveillance in South Africa: A murky legal landscape to navigate?
机译:
南非的国民电子通信监视:迈出的Myky法律景观?
作者:
Watney Murdoch
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
military communication;
surveillance;
National Security Agency;
South African nationals;
United Kingdom Government Communications;
electronic communication surveillance;
electronic communication technology;
government surveillance;
human rights protection;
landscape;
surveillance technology;
transparent surveillance landscape;
Government;
Monitoring;
National security;
Receivers;
South African surveillance landscape;
electronic communication;
law enforcement;
legal framework;
state security;
state-on-nationals surveillance;
27.
Unsolicited Short Message Service marketing: A preliminary investigation into individual acceptance, perceptions of content, and privacy concerns
机译:
未经请求的短信服务营销:对个人验收,内容认知和隐私问题的初步调查
作者:
van der Merwe McDonald
;
van Staden Wynand Jc
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
data privacy;
electronic messaging;
human factors;
marketing data processing;
SMS marketing campaigns;
South Africa;
consumer awareness;
content perceptions;
data collection;
descriptive analysis techniques;
global perception;
legislation;
local companies;
negative attitude;
negative perception;
privacy concerns;
privacy control;
privacy management;
privacy principles;
unsolicited short message service marketing;
user acceptance;
user concerns;
user sentiment;
Companies;
Guidelines;
Law;
Legislation;
Mobile communication;
Mobile handsets;
Privacy;
Fair Information Practice Principles;
Mobile Marketing;
PII;
Permission Based Marketing;
Privacy;
Purpose Limitation;
SMS;
Target Marketing;
28.
Playing hide-and-seek: Detecting the manipulation of Android Timestamps
机译:
播放隐藏和寻求:检测Android时间戳的操纵
作者:
Pieterse Heloise
;
Olivier Martin S.
;
van Heerden Renier P.
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
Android (operating system);
SQL;
authorisation;
relational databases;
smart phones;
AFAT;
Android file system;
Android smart phones;
Android timestamp manipulation detection;
SQLite databases;
authenticity framework-for-Android timestamps;
criminal activities;
database inconsistency identification;
mobile operating system;
mobile technology;
trace evidence;
Androids;
Computer architecture;
Databases;
Humanoid robots;
Permission;
Smart phones;
Universal Serial Bus;
Android;
Digital Forensics;
Manipulation;
Mobile Forensics;
SQLite Databases;
Smartphones;
Timestamps;
29.
Robustness of computational intelligent assurance models when assessing e-Commerce sites
机译:
评估电子商务网站时计算智能保障模型的鲁棒性
作者:
Mayayise Thembekile O.
;
Osunmakinde Isaac O.
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
ISO standards;
Web sites;
analytic hierarchy process;
electronic commerce;
legislation;
transaction processing;
trusted computing;
PRAHP algorithms;
advanced ISO;
advanced legislation;
advanced security;
analytical hierarchy process;
computational intelligent assurance model;
customer concerns;
customer site perceptions;
cyber space;
e-commerce assurance platform;
e-commerce environments;
e-commerce websites;
online transaction;
page ranking;
robust intelligent PRAHP framework;
trustworthy transactional relationships;
Legislation;
Mathematical model;
Robustness;
Seals;
Security;
Standards;
AHP;
Assessment;
Assurance;
DT;
E-commerce;
Legislation;
PR;
Policy;
30.
The effects of the PoPI Act on small and medium enterprises in South Africa
机译:
POPI法对南非中小企业的影响
作者:
Botha J.G.
;
Eloff M.M.
;
Swart I.
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
business data processing;
data privacy;
legislation;
small-to-medium enterprises;
PoPI Act;
Protection of Personal Information Act;
SME;
South Africa;
business owners;
constitutional right;
cost effective option;
customer privacy;
data information privacy regulator;
direct marketing;
employee privacy;
legislation;
personal identifiable information;
small and medium enterprises;
Agriculture;
Legislation;
Recruitment;
Direct marketing;
Effects;
PII;
SMEs;
privacy;
31.
The state of database forensic research
机译:
数据库法医研究
作者:
Hauger Werner K.
;
Olivier Martin S.
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
cloud computing;
database management systems;
digital forensics;
cloud forensic discipline;
database forensic research material;
digital forensics;
digital space;
end-user applications;
expressed sentiment validity;
scientific research material;
Cloud computing;
Computers;
Database systems;
Digital forensics;
Google;
database forensics;
scientific research;
survey;
32.
Analyzing the security posture of South African websites
机译:
分析南非网站的安全姿势
作者:
Mtsweni J.
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
Web sites;
security of data;
Amazon Alexa service;
South African Web sites;
Web-based applications;
Web-based attacks;
Web-based vulnerabilities;
clickjacking attack;
client-side security policy;
cross-site scripting attack;
cyber-attacks;
injection vulnerabilities;
man-in-middle attack;
mobile devices;
public-facing Web sites;
security countermeasures;
security defense mechanisms;
security posture;
Banking;
Education;
Government;
Security;
TV;
World Wide Web;
cybersecurity;
security policies;
south africa;
web applications;
websecurity;
websites;
33.
An investigation into credit card information disclosure through Point of Sale purchases
机译:
通过销售点的信用卡信息披露调查
作者:
von Solms S.
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
electronic money;
security of data;
POS terminal;
POS transaction receipts;
South Africa;
cashless payment method;
credit card information disclosure;
debit card;
online shopping sites;
point-of-sale purchase;
transaction receipts;
Authorization;
Credit cards;
Footwear;
Logic gates;
Performance evaluation;
Petroleum;
Safety;
Point of sale;
disclosure;
personal information;
34.
Exploring the human dimension of TETRA
机译:
探索四方的人的维度
作者:
Fouche Nico Pieter
;
Thomson Kerry-Lynn
会议名称:
《Information Security for South Africa Conference》
|
2011年
关键词:
Information Security;
Social Engineering;
Terrestrial Trunked Radio (TETRA);
35.
Android botnets on the rise: Trends and characteristics
机译:
Android Botnets上升:趋势和特点
作者:
Pieterse Heloise
;
Olivier Martin S
会议名称:
《Information Security for South Africa Conference》
|
2012年
36.
Self-sanitization of digital images using steganography
机译:
使用隐写术的数字图像自我消毒
作者:
Morkel Tayana
会议名称:
《Information Security for South Africa Conference》
|
2015年
关键词:
image watermarking;
steganography;
LSB steganography;
digital image self-sanitization;
embedded information size reduction;
image embedding;
image part hiding;
image part removal;
image steganography technique;
information hiding;
least significant bit steganography;
sensitive material;
statistical analysis technique;
unsanitized image;
visual analysis technique;
Cryptography;
image sanitization;
information hiding;
steganography;
37.
Focus
机译:
重点
作者:
(missing)
会议名称:
《Information Security for South Africa Conference》
|
2011年
38.
Review process
机译:
审查过程
会议名称:
《Information Security for South Africa Conference》
|
2014年
39.
From information security to cyber security cultures
机译:
从信息安全到网络安全文化
作者:
Reid Rayne
;
Van Niekerk Johan
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Computer crime;
Context modeling;
Educational institutions;
Organizations;
cyber security culture;
definition;
human factor;
information securty culture;
40.
Suitability of quantum cryptography for national facilities
机译:
适用于国家设施的量子密码
作者:
Mirza Abdul
;
Senekane Makhamisa
;
Petruccione Francesco
;
van Niekerk Brett
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Cryptography;
Educational institutions;
Quantum mechanics;
TV;
critical infrastructure protection;
quantum cryptography;
quantum key distribution;
vulnerability assessment;
41.
Online safety in South Africa - A cause for growing concern
机译:
在线安全在南非 - 令人担忧的原因
作者:
Kritzinger E
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Computer security;
Educational institutions;
Ethics;
Internet;
Materials;
Mobile handsets;
Safety;
awareness;
cyber;
online;
safety;
school leaners;
42.
Social engineering attack framework
机译:
社会工程攻击框架
作者:
Mouton Francois
;
Malan Mercia M.
;
Leenen Louise
;
Venter H.S.
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Ash;
Buildings;
Data models;
Electronic mail;
Information security;
Vectors;
Bidirectional Communication;
Indirect Communication;
Mitnick's Attack Cycle;
Ontological Model;
Social Engineering;
Social Engineering Attack;
Social Engineering Attack Framework;
Unidirectional Communication;
43.
Exploring end-user smartphone security awareness within a South African context
机译:
探索南非背景中的最终用户智能手机安全意识
作者:
Ophoff Jacques
;
Robinson Mark
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Androids;
Context;
Humanoid robots;
Portable computers;
Security;
Awareness and Training in Security;
Mobile Computing Security;
Smartphone;
44.
Towards a sandbox for the deobfuscation and dissection of PHP malware
机译:
走向沙箱,用于对PHP恶意软件的脱泡和解剖
作者:
Wrench Peter M.
;
Irwin Barry V.W.
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Arrays;
Databases;
Decoding;
Malware;
Process control;
Semantics;
Software;
Code deobfuscation;
Reverse engineering;
Sandboxing;
45.
Towards a platform to visualize the state of South Africa's information security
机译:
迈向一个可视化南非信息安全状态的平台
作者:
Swart Ignus
;
Irwin Barry
;
Grobler Marthie
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
ISO;
Monitoring;
NIST;
Security;
Visualization;
CVE;
ISO 27001-2;
National infrastructure;
big data;
information security readiness;
security metrics;
visualisation;
46.
Security objectives, controls and metrics development for an Android smartphone application
机译:
Android智能手机应用程序的安全目标,控件和指标开发
作者:
Savola Reijo M.
;
Kylanpaa Markku
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Authorization;
Libraries;
Monitoring;
Android;
risk analysis;
security effectiveness;
security metrics;
security objectives;
47.
Information security culture: A general living systems theory perspective
机译:
信息安全文化:一般生活系统理论观点
作者:
Reid Rayne
;
Van Niekerk Johan
;
Renaud Karen
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Educational institutions;
Information security;
Measurement;
conceptual;
general living systems theory;
information security culture;
48.
Combatting phishing: A holistic human approach
机译:
打击网络钓鱼:整体人类方法
作者:
Frauenstein Edwin D.
;
von Solms Rossouw
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
ISO;
Lead;
Security;
Training;
COBIT;
agency theory;
human factors;
organizational aspects;
phishing;
security education training and awareness;
social engineering;
technological controls;
technology acceptance model;
49.
A digital forensic model for providing better data provenance in the cloud
机译:
一种数字法医模型,用于在云中提供更好的数据出处
作者:
Trenwith Philip M.
;
Venter Hein S.
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Cloud computing;
Computational modeling;
Computers;
Digital forensics;
Open systems;
Protocols;
Servers;
Cloud Computing;
Digital Forensic Investigation;
Digital Forensics;
annotations;
bilinear pairing technique;
chain of custody;
data provenance;
50.
Security foundation for a distributed cabin core architecture
机译:
分布式舱核心架构的安全基础
作者:
Kuntze Nicolai
;
Rudolph Carsten
;
Hanka Oliver
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Aircraft;
Computer architecture;
Field programmable gate arrays;
Hardware;
Peer-to-peer computing;
Security;
Software;
51.
Software-defined radio (SDR) as a mechanism for exploring cyber-electronic warfare (EW) collaboration
机译:
软件定义的无线电(SDR)作为探索网络电子战(EW)协作的机制
作者:
du Plessis Warren P.
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Bandwidth;
Collaboration;
Computers;
Hardware;
Protocols;
Software;
Standards;
Electronic warfare (EW);
cyber;
electromagnetic spectrum (EMS);
software-defined radio (SDR);
52.
Concerns regarding service authorization by IP address using eduroam
机译:
有关IP地址使用Eduroam的服务授权的担忧
作者:
Tekeni Luzuko
;
Thomson Kerry-Lynn
;
Botha Reinhardt A.
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
IEEE Xplore;
Servers;
Authorization;
IP-Based;
Service Level Agreement;
eduroam;
53.
The role of triggers in database forensics
机译:
触发器在数据库取证中的作用
作者:
Hauger Werner K.
;
Olivier Martin S.
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Databases;
Dictionaries;
Forensics;
Irrigation;
Monitoring;
Reliability;
database forensics;
database triggers;
digital forensic analysis;
methods;
processes;
54.
Integrity of a common operating picture in military situational awareness
机译:
军事情境意识中常见的经营映像的完整性
作者:
Robertson Jaco
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Cameras;
Microwave integrated circuits;
Weight measurement;
Wireless communication;
Command and Control;
Common Operating Picture;
Integrity;
Situational Awareness;
55.
The murky waters of IT governance
机译:
IT治理的朦胧水域
作者:
Coertze Jacques
;
von Solms Rossouw
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Board of Directors;
IEC standards;
ISO standards;
Monitoring;
Personnel;
COBIT 5;
ISO/IEC 38500;
ITIL;
King III;
board IT governance;
corporate governance;
corporate governance of IT;
enterprise governance of IT;
operational IT governance;
56.
An analysis of Facebook's graph search
机译:
Facebook的图形搜索分析
作者:
Khan Zubeida Casmod
;
Mashiane Thulani
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Africa;
Demography;
Instruments;
Robots;
Semantics;
Facebook;
authentication;
cyber security;
cyber warfare;
cyber-criminal;
graph search;
identity theft;
spam;
stalking;
57.
Focus
机译:
重点
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Educational institutions;
Forensics;
Information security;
58.
An exploration of geolocation and traffic visualisation using network flows
机译:
使用网络流的地理位置和流量可视化探索
作者:
Pennefather Sean
;
Irwin Barry
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Data visualization;
Databases;
Geology;
IP networks;
Protocols;
Prototypes;
Servers;
59.
An investigation into reducing third party privacy breaches during the investigation of cybercrime
机译:
减少三方隐私违约赛的调查控制网络犯罪
作者:
van Staden Wynand JC
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Business;
Context;
Digital forensics;
Electronic mail;
Indexes;
Postal services;
Privacy;
Cybercrime;
Digital Forensics;
Privacy;
Privacy Breach;
Third Party Privacy;
60.
Considering the influence of human trust in practical social engineering exercises
机译:
考虑人类信任对实际社会工程练习的影响
作者:
Kearney WD
;
Kruger HA
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Information security;
Online banking;
Reliability;
Information security;
Phishing;
Social engineering;
Trust;
61.
A survey of trust issues constraining the growth of Identity Management-as-a-Service(IdMaaS)
机译:
限制身份管理的增长(IDMAAS)的信托问题调查
作者:
Mpofu Nkosinathi
;
van Staden Wynand JC
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Authentication;
Authorization;
Availability;
Cloud computing;
identity management;
identity management-as- as-service;
trust;
62.
Towards a prototype for guidance and implementation of a standardized digital forensic investigation process
机译:
朝着标准化数字法医调查过程的指导和实施的原型
作者:
Valjarevic Aleksandar
;
Venter Hein S.
;
Ingles Melissa
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Analytical models;
Cryptography;
Irrigation;
ISO/IEC 27043;
digital forensic investigation process model;
digital forensics;
harmonization;
implementation prototype;
standardization;
63.
On a domain block based mechanism to mitigate DoS attacks on shared caches in asymmetric multiprocessing multi operating systems
机译:
基于域块的基于域块的机制,用于缓解非对称多处理多操作系统中共享缓存的DOS攻击
作者:
Schnarz Pierre
;
Fischer Clemens
;
Wietzke Joachim
;
Stengel Ingo
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Computer architecture;
Computer crime;
Hardware;
Interference;
Program processors;
System-on-chip;
Vectors;
64.
Is bring your own device an institutional information security risk for small-scale business organisations?
机译:
将您自己的设备带来小型企业组织的机构信息安全风险吗?
作者:
Madzima Kudakwashe
;
Moyo Moses
;
Abdullah Hanifa
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Malware;
Bring your own devices (BYOD);
information security;
risks and institutional risks;
small-scale organisations;
65.
Mobile forensics using the harmonised digital forensic investigation process
机译:
使用协调的数字法医调查过程的移动取证
作者:
Mumba Emilio Raymond
;
Venter H.S.
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
ISO standards;
Performance evaluation;
Harmonised Digital Forensic Investigation Process (HDFIP);
ISO/IEC 27043;
mobile device;
mobile forensics;
66.
Testing antivirus engines to determine their effectiveness as a security layer
机译:
测试防病毒发动机以确定其作为安全层的有效性
作者:
Haffejee Jameel
;
Irwin Barry
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Companies;
Cryptography;
Engines;
Malware;
Payloads;
Testing;
Antivirus;
Defense;
Malware;
67.
Facebook: The risk-taking attitude amongst Emerging Adults
机译:
Facebook:新兴成年人之间的风险态度
作者:
Ally Sayed Enayat Sayed
;
Blewett Craig
;
van Niekerk Brett
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Educational institutions;
Facebook;
Internet;
Privacy;
Facebook;
Personal Identifiable Information;
Risk-Taking Attitude;
68.
Privacy: A review of publication trends
机译:
隐私:出版趋势综述
作者:
Hinde Charlie
;
Ophoff Jacques
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Computers;
Internet;
Market research;
Privacy;
Managing Information Security;
Privacy;
69.
The Mexican Cartels' employment of Inform and Influence Activities (IIA) as tools of asymmetrical warfare
机译:
墨西哥卡特尔的就业人员提供信息(IIA)作为不对称战争的工具
作者:
Castillo Juan-Camilo
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Computational modeling;
Educational institutions;
Force;
Software;
70.
Introduction
机译:
介绍
作者:
Venter Hein
;
Loock Marianne
;
Coetzee Marijke
;
Eloff Mariki
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Educational institutions;
Industries;
Security;
71.
Implementation guidelines for a harmonised digital forensic investigation readiness process model
机译:
统一数字法医调查准备过程模型的实施指南
作者:
Valjarevic Aleksandar
;
Venter H.S.
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
digital forensics;
guidelines;
information systems security;
mode;
process;
72.
Real-time distributed malicious traffic monitoring for honeypots and network telescopes
机译:
蜜罐和网络望远镜的实时分布式恶意流量监控
作者:
Hunter Samuel Oswald
;
Irwin Barry
;
Stalmans Etienne
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
data mining;
monitoring;
remote fingerprinting;
situational awareness;
73.
Information Security Assurance Model (ISAM) for an Examination Paper Preparation Process
机译:
检查纸制制备过程的信息安全保障模型(ISAM)
作者:
Mogale Miemie
;
Gerber Mariana
;
Carroll Mariana
;
von Solms Rossouw
会议名称:
《Information Security for South Africa Conference》
|
2014年
关键词:
Authorization;
Lead;
Manuals;
Smart phones;
higher education institutions;
information and communications technology;
information security;
information security management system;
information security risk management;
threats;
vulnerabilities;
74.
Challenges to digital forensics: A survey of researchers practitioners attitudes and opinions
机译:
数字取证挑战:研究人员与从业者态度和意见的调查
作者:
Al Fahdi M.
;
Clarke N.L.
;
Furnell S.M.
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
Cybercrime;
Cybersecurity;
Digital Forensics;
Forensic Tools;
75.
A software gateway to affordable and effective Information Security Governance in SMMEs
机译:
SMMES中经济实惠和有效的信息安全治理的软件网关
作者:
Coertze Jacques
;
von Solms Rossouw
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
IT governance;
automation;
corporate governance;
enterprise security;
information security;
information security governance;
managing information security;
methodologies for securing small/medium size enterprises;
security policy and procedures;
76.
The identification of information sources to aid with Critical Information Infrastructure Protection
机译:
识别信息来源,以援助关键信息基础设施保护
作者:
Mouton Jean
;
Ellefsen Ian
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
C-SAW Team;
CSIRT;
CVEs;
CVSS;
Critical Information Infrastructure;
Critical Information Infrastructure Protection;
Vulnerability Information Sources;
77.
A compliant assurance model for assessing the trustworthiness of cloud-based e-commerce systems
机译:
评估基于云的电子商务系统可信度的柔顺保证模型
作者:
Mayayise Thembekile O.
;
Osunmakinde Isaac O.
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
assurance;
cloud;
e-commerce;
model;
seal;
trustworthiness;
78.
A conceptual opportunity-based framework to mitigate the insider threat
机译:
基于机会的概念框架,用于减轻内部内部威胁
作者:
Padayachee Keshnee
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
insider threat;
rational choice theory;
routine activities theory;
situational crime prevention theory;
79.
Bimodal biometrics for financial infrastructure security
机译:
用于金融基础设施安全的双峰生物识别学
作者:
Esan O.A.
;
Ngwira S.M.
;
Osunmakinde I.O.
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
Authentication;
Distortion;
Face;
Fingerprint;
Misalignment;
Model;
Noise;
biometrics;
80.
Insider threat detection model for the cloud
机译:
内幕威胁云的威胁检测模型
作者:
Nkosi Lucky
;
Tarwireyi Paul
;
Adigun Matthew O
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
cloud;
insider;
security;
sequential rule mining;
81.
Data vulnerability detection by security testing for Android applications
机译:
Android应用程序安全测试数据漏洞检测
作者:
Salva Sebastien
;
Zafimiharisoa Stassia R.
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
Android applications;
Mobile device security;
Model-based testing;
Security testing;
82.
Towards a framework for enhancing potential digital evidence presentation
机译:
迈向增强潜在数字证据介绍的框架
作者:
Karie Nickson M.
;
Venter H.S.
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
admissibility of evidence;
digital forensics;
evidence presentation;
evidence validation;
evidence weight;
law enforcement agencies;
legal proceedings;
83.
Toward risk-driven security measurement for Android smartphone platforms
机译:
对Android智能手机平台的风险驱动安全性测量
作者:
Savola Reijo M.
;
Vaisanen Teemu
;
Evesti Antti
;
Savolainen Pekka
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
Android;
risk analysis;
security effectiveness;
security metrics;
84.
A high-level architecture for efficient packet trace analysis on GPU co-processors
机译:
GPU协处理器有效数据包跟踪分析的高级架构
作者:
Nottingham Alastair
;
Irwin Barry
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
Computer networks;
Data mining;
GPGPU;
Information security;
85.
Towards Reputation-as-a-Service
机译:
向声誉 - 作为服务
作者:
Hillebrand Channel
;
Coetzee Marijke
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
RaaS;
SaaS;
reputation;
reputation framework;
trust;
86.
Social engineering from a normative ethics perspective
机译:
规范性伦理视角的社会工程
作者:
Mouton F
;
Malan M M
;
Venter H S
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
Consequentialism;
Deontology;
Ethical Concerns;
Ethics;
Penetration Testing;
Public Communication;
Social Engineering;
Social Engineering Research;
Utilitarianism;
87.
SNIPPET: Genuine knowledge-based authentication
机译:
片段:正版知识的身份验证
作者:
Renaud Karen
;
Kennes Demetris
;
van Niekerk Johan
;
Maguire Joe
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
Authentication;
Experts;
Knowledge;
88.
Testing the harmonised digital forensic investigation process model-using an Android mobile phone
机译:
使用Android手机测试统一的数字法医调查过程模型
作者:
Omeleze Stacey
;
Venter H.S.
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
(ISO/IEC 27043);
Android mobile phone;
Mobile forensics;
digital forensics investigation procedure;
harmonised digital forensic investigation process model;
mobile forensic framework;
89.
Selection and ranking of remote hosts for digital forensic investigation in a Cloud environment
机译:
云环境中数字法医调查的远程主机的选择和排序
作者:
Sibiya George
;
Fogwill Thomas
;
Venter H.S.
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
Cloud Computing;
Digital Forensic Processes;
Digital Forensics;
Intrusion Detection;
90.
Digital forensic readiness in the cloud
机译:
云中的数字法医准备
作者:
Trenwith Philip M
;
Venter H.S.
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
AES;
Cloud Computing;
Cryptographic Hash Functions;
Diffie-Hellman;
Digital Forensic Investigation Process;
Digital Forensic Readiness;
Digital Forensics;
Network Time Protocol;
RSA;
Remote and Centralized Logging;
Windows Event Logs;
91.
A kernel-driven framework for high performance internet routing simulation
机译:
用于高性能互联网路由仿真的内核驱动框架
作者:
Herbert Alan
;
Irwin Barry
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
Packet routing;
networks;
simulation;
92.
Democratic detection of malicious behaviour in MANET: A voting process
机译:
MANET中恶意行为的民主发现:投票过程
作者:
Ochola EO
;
Eloff MM
;
van der Poll JA
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
MANET;
black-hole attack;
power-aware routing;
security;
watchdog;
93.
Amber: A zero-interaction honeypot and network enforcer with modular intelligence
机译:
琥珀色:具有模块化智能的零互动蜜罐和网络实践者
作者:
Schoeman Adam
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
Honeypot;
Security Models;
94.
Classification of Security Operation Centers
机译:
安全运营中心分类
作者:
Jacobs Pierre
;
Arnab Alapan
;
Irwin Barry
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
Computer Incident Response Team;
Security Operations Center;
classification matrix;
maturity model;
95.
The characteristics of a biometric
机译:
生物识别的特点
作者:
van de Haar Helen
;
van Greunen Darelle
;
Pottas Dalenca
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
biometrics;
characteristics;
face;
fingerprint;
inherent;
iris;
procedural;
technical;
voice;
96.
Factors affecting user experience with security features: A case study of an academic institution in Namibia
机译:
影响安全特征的用户体验的因素:纳米比亚学术机构的案例研究
作者:
Shava Fungai Bhunu
;
van Greunen Darelle
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
end user application program;
security feature;
user behaviour;
user experience;
97.
Visualization of a data leak
机译:
可视化数据泄漏
作者:
Swart I.P.
;
Grobler M.M.
;
Irwin B.
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
Internet;
data leakage;
privacy laws;
security;
98.
An analysis of service degradation attacks against real-time MPLS networks
机译:
对实时MPLS网络的服务劣化攻击分析
作者:
Al-Mutairi Abdulrahman
;
Wolthusen Stephen D.
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
Adversary Modelling;
Class of Service;
Crippling Attacks;
Denial of Service;
Multiprotocol Label Switching;
Quality of Service;
Real-Time Networks;
99.
Security steps for smartphone users
机译:
智能手机用户的安全步骤
作者:
Pieterse Heloise
;
Olivier Martin S
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
Android;
Malware;
Security;
Smartphones;
100.
Information security risk management in small-scale organisations: A case study of secondary schools computerised information systems
机译:
小型组织中信息安全风险管理:中学计算机化信息系统的案例研究
作者:
Moyo Moses
;
Abdullah Hanifa.
;
Nienaber Rita C.
会议名称:
《Information Security for South Africa Conference》
|
2013年
关键词:
computerised information systems;
exposure;
information security;
risk;
risk analysis;
risk assessment;
risk management;
threats;
vulnerability;
意见反馈
回到顶部
回到首页