default search action
Search dblp for Publications
export results for "toc:db/conf/issa/issa2013.bht:"
@inproceedings{DBLP:conf/issa/Al-MutairiW13, author = {Abdulrahman Al{-}Mutairi and Stephen D. Wolthusen}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {An analysis of service degradation attacks against real-time {MPLS} networks}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641057}, doi = {10.1109/ISSA.2013.6641057}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/issa/Al-MutairiW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/CoertzeS13, author = {Jacques Coertze and Rossouw von Solms}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {A software gateway to affordable and effective Information Security Governance in SMMEs}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641035}, doi = {10.1109/ISSA.2013.6641035}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/CoertzeS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/EsanNO13, author = {Omobayo A. Esan and Seleman M. Ngwira and Isaac Olusegun Osunmakinde}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Bimodal biometrics for financial infrastructure security}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641045}, doi = {10.1109/ISSA.2013.6641045}, timestamp = {Mon, 29 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/EsanNO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/FahdiCF13, author = {M. Al Fahdi and Nathan L. Clarke and Steven M. Furnell}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Challenges to digital forensics: {A} survey of researchers {\&} practitioners attitudes and opinions}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641058}, doi = {10.1109/ISSA.2013.6641058}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/FahdiCF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HaarGP13, author = {Helen van de Haar and Darelle van Greunen and Dalenca Pottas}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {The characteristics of a biometric}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641037}, doi = {10.1109/ISSA.2013.6641037}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/HaarGP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HerbertI13, author = {Alan Herbert and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {A kernel-driven framework for high performance internet routing simulation}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641048}, doi = {10.1109/ISSA.2013.6641048}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/HerbertI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HillebrandC13, author = {Channel Hillebrand and Marijke Coetzee}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Towards Reputation-as-a-Service}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641047}, doi = {10.1109/ISSA.2013.6641047}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/HillebrandC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/HunterIS13, author = {Samuel Oswald Hunter and Barry Irwin and Etienne Stalmans}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Real-time distributed malicious traffic monitoring for honeypots and network telescopes}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--9}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641050}, doi = {10.1109/ISSA.2013.6641050}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/HunterIS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/JacobsAI13, author = {Pierre Jacobs and Alapan Arnab and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Classification of Security Operation Centers}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641054}, doi = {10.1109/ISSA.2013.6641054}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/JacobsAI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KarieV13, author = {Nickson M. Karie and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Towards a framework for enhancing potential digital evidence presentation}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641039}, doi = {10.1109/ISSA.2013.6641039}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/KarieV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MayayiseO13, author = {Thembekile O. Mayayise and Isaac Olusegun Osunmakinde}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {A compliant assurance model for assessing the trustworthiness of cloud-based e-commerce systems}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641042}, doi = {10.1109/ISSA.2013.6641042}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MayayiseO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MoutonE13, author = {Jean Mouton and Ian Ellefsen}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {The identification of information sources to aid with Critical Information Infrastructure Protection}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641038}, doi = {10.1109/ISSA.2013.6641038}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MoutonE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MoutonMV13, author = {Francois Mouton and Mercia M. Malan and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Social engineering from a normative ethics perspective}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641064}, doi = {10.1109/ISSA.2013.6641064}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MoutonMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MoyoAN13, author = {Moses Moyo and Hanifa Abdullah and Rita C. Nienaber}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Information security risk management in small-scale organisations: {A} case study of secondary schools computerised information systems}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641062}, doi = {10.1109/ISSA.2013.6641062}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MoyoAN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NkosiTA13, author = {Lucky Nkosi and Paul Tarwireyi and Matthew O. Adigun}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Insider threat detection model for the cloud}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641040}, doi = {10.1109/ISSA.2013.6641040}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/NkosiTA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NottinghamI13, author = {Alastair Nottingham and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {A high-level architecture for efficient packet trace analysis on {GPU} co-processors}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641052}, doi = {10.1109/ISSA.2013.6641052}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/NottinghamI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OcholaEP13, author = {Elisha O. Ochola and Mariki M. Eloff and John A. van der Poll}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Democratic detection of malicious behaviour in {MANET:} {A} voting process}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641051}, doi = {10.1109/ISSA.2013.6641051}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/OcholaEP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OmelezeV13, author = {Stacey Omeleze and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Testing the harmonised digital forensic investigation process model-using an Android mobile phone}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641063}, doi = {10.1109/ISSA.2013.6641063}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/OmelezeV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Padayachee13, author = {Keshnee Padayachee}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {A conceptual opportunity-based framework to mitigate the insider threat}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641060}, doi = {10.1109/ISSA.2013.6641060}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Padayachee13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/PieterseO13, author = {Heloise Pieterse and Martin S. Olivier}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Security steps for smartphone users}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641036}, doi = {10.1109/ISSA.2013.6641036}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/PieterseO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/RenaudKNM13, author = {Karen Renaud and Demetris Kennes and Johan Van Niekerk and Joe Maguire}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {{SNIPPET:} Genuine knowledge-based authentication}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641059}, doi = {10.1109/ISSA.2013.6641059}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/RenaudKNM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SalvaZ13, author = {S{\'{e}}bastien Salva and Stassia R. Zafimiharisoa}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Data vulnerability detection by security testing for Android applications}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641043}, doi = {10.1109/ISSA.2013.6641043}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SalvaZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SavolaVESKK13, author = {Reijo M. Savola and Teemu V{\"{a}}is{\"{a}}nen and Antti Evesti and Pekka Savolainen and Juha Kemppainen and Marko Kokemaki}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Toward risk-driven security measurement for Android smartphone platforms}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641049}, doi = {10.1109/ISSA.2013.6641049}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SavolaVESKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Schoeman13, author = {Adam Schoeman}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Amber: {A} zero-interaction honeypot and network enforcer with modular intelligence}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641053}, doi = {10.1109/ISSA.2013.6641053}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/Schoeman13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ShavaG13, author = {Fungai Bhunu Shava and Darelle van Greunen}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Factors affecting user experience with security features: {A} case study of an academic institution in Namibia}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641061}, doi = {10.1109/ISSA.2013.6641061}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ShavaG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SibiyaFV13, author = {George Sibiya and Thomas Fogwill and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Selection and ranking of remote hosts for digital forensic investigation in a Cloud environment}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641044}, doi = {10.1109/ISSA.2013.6641044}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SibiyaFV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SwartGI13, author = {Ignus P. Swart and Marthie Grobler and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Visualization of a data leak}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641046}, doi = {10.1109/ISSA.2013.6641046}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/SwartGI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/TrenwithV13, author = {Philip M. Trenwith and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Digital forensic readiness in the cloud}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641055}, doi = {10.1109/ISSA.2013.6641055}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/TrenwithV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ValjarevicV13, author = {Aleksandar Valjarevic and Hein S. Venter}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Implementation guidelines for a harmonised digital forensic investigation readiness process model}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--9}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641041}, doi = {10.1109/ISSA.2013.6641041}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ValjarevicV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/VenterLC13, author = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Introduction}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641030}, doi = {10.1109/ISSA.2013.6641030}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/VenterLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/WestonW13, author = {Peter Weston and Stephen D. Wolthusen}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Forensic entropy analysis of microsoft windows storage volumes}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641056}, doi = {10.1109/ISSA.2013.6641056}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/WestonW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2013, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6621627/proceeding}, isbn = {978-1-4799-0808-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.