Sciweavers

ISSA
2008
13 years 10 months ago
No Age Discrimination for Biometrics
Biometric advances apply to a range of disciplines to ensure the safety and security of individuals and groups. To stress the value of biometrics, this study focuses on the applic...
Marthie Lessing, Lara Weissenberger
ISSA
2008
13 years 10 months ago
Password Management: Empirical Results from a RSA and USA Study
"The state of information security as a whole is a disaster, a train wreck". This view is given by Forte and Power (2007) describing the state of information security to...
Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Da...
ISSA
2008
13 years 10 months ago
Emerging Framework for The Evaluation of Open Source Security Tools
The drive from the South African Government towards the adoption of open source software across all platforms, incurred a number of research and development questions. The open so...
Elmarie Biermann, Jan Mentz
ISSA
2008
13 years 10 months ago
Computer Monitoring in the 21st Century Workplace
This paper attempts to lay the foundation for future research into an area that has been called the "hottest workplace privacy topic of the next decade." The existing em...
Sri Warna Mahanamahewa
ISSA
2008
13 years 10 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche
ISSA
2008
13 years 10 months ago
The IP Protection of Electronic Databases: Copyright or Copywrong?
The protection of the intellectual investments embodied in databases is of the utmost importance. Technological innovation has rendered databases vulnerable to unauthorised access...
Tana Pistorius
ISSA
2008
13 years 10 months ago
UML Modelling of Digital Forensic Process Models (DFPMs)
Michal Köhn, Jan H. P. Eloff, Martin S. Olivi...
ISSA
2008
13 years 10 months ago
Towards a Framework for a Network Warfare Capability
Information warfare has surfaced as an emerging concept that affects not only military institutions but ordinary organisations as well. Information warfare in itself consists of v...
Namosha Veerasamy, Jan H. P. Eloff
ICONIP
2007
13 years 10 months ago
Neural Decoding of Movements: From Linear to Nonlinear Trajectory Models
To date, the neural decoding of time-evolving physical state – for example, the path of a foraging rat or arm movements – has been largely carried out using linear trajectory m...
Byron M. Yu, John P. Cunningham, Krishna V. Shenoy...
ISSA
2008
13 years 10 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche