Search dblp for Publications

export results for "toc:db/conf/issa/issa2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/issa/Al-MutairiW13,
  author       = {Abdulrahman Al{-}Mutairi and
                  Stephen D. Wolthusen},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {An analysis of service degradation attacks against real-time {MPLS}
                  networks},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641057},
  doi          = {10.1109/ISSA.2013.6641057},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Al-MutairiW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/CoertzeS13,
  author       = {Jacques Coertze and
                  Rossouw von Solms},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {A software gateway to affordable and effective Information Security
                  Governance in SMMEs},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641035},
  doi          = {10.1109/ISSA.2013.6641035},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/CoertzeS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/EsanNO13,
  author       = {Omobayo A. Esan and
                  Seleman M. Ngwira and
                  Isaac Olusegun Osunmakinde},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Bimodal biometrics for financial infrastructure security},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641045},
  doi          = {10.1109/ISSA.2013.6641045},
  timestamp    = {Mon, 29 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/EsanNO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/FahdiCF13,
  author       = {M. Al Fahdi and
                  Nathan L. Clarke and
                  Steven M. Furnell},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Challenges to digital forensics: {A} survey of researchers {\&}
                  practitioners attitudes and opinions},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641058},
  doi          = {10.1109/ISSA.2013.6641058},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/FahdiCF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HaarGP13,
  author       = {Helen van de Haar and
                  Darelle van Greunen and
                  Dalenca Pottas},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {The characteristics of a biometric},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641037},
  doi          = {10.1109/ISSA.2013.6641037},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/HaarGP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HerbertI13,
  author       = {Alan Herbert and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {A kernel-driven framework for high performance internet routing simulation},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641048},
  doi          = {10.1109/ISSA.2013.6641048},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/HerbertI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HillebrandC13,
  author       = {Channel Hillebrand and
                  Marijke Coetzee},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Towards Reputation-as-a-Service},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641047},
  doi          = {10.1109/ISSA.2013.6641047},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/HillebrandC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/HunterIS13,
  author       = {Samuel Oswald Hunter and
                  Barry Irwin and
                  Etienne Stalmans},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Real-time distributed malicious traffic monitoring for honeypots and
                  network telescopes},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641050},
  doi          = {10.1109/ISSA.2013.6641050},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/HunterIS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/JacobsAI13,
  author       = {Pierre Jacobs and
                  Alapan Arnab and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Classification of Security Operation Centers},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641054},
  doi          = {10.1109/ISSA.2013.6641054},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/JacobsAI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KarieV13,
  author       = {Nickson M. Karie and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Towards a framework for enhancing potential digital evidence presentation},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641039},
  doi          = {10.1109/ISSA.2013.6641039},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/KarieV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MayayiseO13,
  author       = {Thembekile O. Mayayise and
                  Isaac Olusegun Osunmakinde},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {A compliant assurance model for assessing the trustworthiness of cloud-based
                  e-commerce systems},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641042},
  doi          = {10.1109/ISSA.2013.6641042},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MayayiseO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MoutonE13,
  author       = {Jean Mouton and
                  Ian Ellefsen},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {The identification of information sources to aid with Critical Information
                  Infrastructure Protection},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641038},
  doi          = {10.1109/ISSA.2013.6641038},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MoutonE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MoutonMV13,
  author       = {Francois Mouton and
                  Mercia M. Malan and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Social engineering from a normative ethics perspective},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641064},
  doi          = {10.1109/ISSA.2013.6641064},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MoutonMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MoyoAN13,
  author       = {Moses Moyo and
                  Hanifa Abdullah and
                  Rita C. Nienaber},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Information security risk management in small-scale organisations:
                  {A} case study of secondary schools computerised information systems},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641062},
  doi          = {10.1109/ISSA.2013.6641062},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MoyoAN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NkosiTA13,
  author       = {Lucky Nkosi and
                  Paul Tarwireyi and
                  Matthew O. Adigun},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Insider threat detection model for the cloud},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641040},
  doi          = {10.1109/ISSA.2013.6641040},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/NkosiTA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NottinghamI13,
  author       = {Alastair Nottingham and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {A high-level architecture for efficient packet trace analysis on {GPU}
                  co-processors},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641052},
  doi          = {10.1109/ISSA.2013.6641052},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/NottinghamI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OcholaEP13,
  author       = {Elisha O. Ochola and
                  Mariki M. Eloff and
                  John A. van der Poll},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Democratic detection of malicious behaviour in {MANET:} {A} voting
                  process},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641051},
  doi          = {10.1109/ISSA.2013.6641051},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/OcholaEP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/OmelezeV13,
  author       = {Stacey Omeleze and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Testing the harmonised digital forensic investigation process model-using
                  an Android mobile phone},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641063},
  doi          = {10.1109/ISSA.2013.6641063},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/OmelezeV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Padayachee13,
  author       = {Keshnee Padayachee},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {A conceptual opportunity-based framework to mitigate the insider threat},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641060},
  doi          = {10.1109/ISSA.2013.6641060},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Padayachee13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/PieterseO13,
  author       = {Heloise Pieterse and
                  Martin S. Olivier},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Security steps for smartphone users},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641036},
  doi          = {10.1109/ISSA.2013.6641036},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/PieterseO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/RenaudKNM13,
  author       = {Karen Renaud and
                  Demetris Kennes and
                  Johan Van Niekerk and
                  Joe Maguire},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {{SNIPPET:} Genuine knowledge-based authentication},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641059},
  doi          = {10.1109/ISSA.2013.6641059},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/RenaudKNM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SalvaZ13,
  author       = {S{\'{e}}bastien Salva and
                  Stassia R. Zafimiharisoa},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Data vulnerability detection by security testing for Android applications},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641043},
  doi          = {10.1109/ISSA.2013.6641043},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SalvaZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SavolaVESKK13,
  author       = {Reijo M. Savola and
                  Teemu V{\"{a}}is{\"{a}}nen and
                  Antti Evesti and
                  Pekka Savolainen and
                  Juha Kemppainen and
                  Marko Kokemaki},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Toward risk-driven security measurement for Android smartphone platforms},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641049},
  doi          = {10.1109/ISSA.2013.6641049},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SavolaVESKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Schoeman13,
  author       = {Adam Schoeman},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Amber: {A} zero-interaction honeypot and network enforcer with modular
                  intelligence},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641053},
  doi          = {10.1109/ISSA.2013.6641053},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/Schoeman13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ShavaG13,
  author       = {Fungai Bhunu Shava and
                  Darelle van Greunen},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Factors affecting user experience with security features: {A} case
                  study of an academic institution in Namibia},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641061},
  doi          = {10.1109/ISSA.2013.6641061},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ShavaG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SibiyaFV13,
  author       = {George Sibiya and
                  Thomas Fogwill and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Selection and ranking of remote hosts for digital forensic investigation
                  in a Cloud environment},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641044},
  doi          = {10.1109/ISSA.2013.6641044},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SibiyaFV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SwartGI13,
  author       = {Ignus P. Swart and
                  Marthie Grobler and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Visualization of a data leak},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641046},
  doi          = {10.1109/ISSA.2013.6641046},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SwartGI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/TrenwithV13,
  author       = {Philip M. Trenwith and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Digital forensic readiness in the cloud},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641055},
  doi          = {10.1109/ISSA.2013.6641055},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/TrenwithV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ValjarevicV13,
  author       = {Aleksandar Valjarevic and
                  Hein S. Venter},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Implementation guidelines for a harmonised digital forensic investigation
                  readiness process model},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641041},
  doi          = {10.1109/ISSA.2013.6641041},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/ValjarevicV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/VenterLC13,
  author       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Introduction},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641030},
  doi          = {10.1109/ISSA.2013.6641030},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/VenterLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/WestonW13,
  author       = {Peter Weston and
                  Stephen D. Wolthusen},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Forensic entropy analysis of microsoft windows storage volumes},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641056},
  doi          = {10.1109/ISSA.2013.6641056},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/WestonW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2013,
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6621627/proceeding},
  isbn         = {978-1-4799-0808-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}