Peer-reviewed Papers: Table of Contents

The printable version of the USB conference proceedings has a tile and contents page as follows (in the order of paper number, i.e. submission number). A complete PDF version of the proceedings can be viewed here.

Content Page
Cover page i
Copyright page ii
Content page iii
Introduction iv
Focus v
Conference Committees vii
Review Committee viii
Review Process xi
Papers  
A framework towards governing “Bring Your Own Device in SMMEs”

Noluvuyo Fani, Rossouw von Solms and Mariana Gerber

1
PoPI Act - opt-in and opt-out compliance from a data value chain perspective: A South African insurance industry experiment

Paulus Swartz and Adele Da Veiga

9
An Interactive Visual Library Model to Improve Awareness in Handling of Business Information

Petrus Marthinus Jacobus Delport, Mariana Gerber and Nader Sohrabi Safa

18
Mobile Device Usage in Higher Education Institutions in South Africa: A Case Study

Ryan De Kock and Lynn Futcher

27
SHA-1 and the Strict Avalanche Criterion

Yusuf Motara and Barry Irwin

35
Specific Emitter Identification for Enhanced Access Control

Jeevan Samuel and Warren Du Plessis

41
Review of Data Storage Protection Approaches for POPI Compliance

Nicholas Scharnick, Mariana Gerber and Lynn Futcher

48
CDMA in signal encryption and information security

Olanrewaju Wojuola, Stanley Mneney and Viranjay M Srivastava

56
Effect of Varying Mobility in the Analysis of Black Hole Attack on MANET Reactive Routing Protocols

Lineo Mejaele and Elisha Ochola

62
The Pattern-richness of Graphical Passwords

Johannes Vorster, Renier van Heerden and Barry Irwin

69
Dridex: analysis of the traffic and automatic generation of IOCs

Lauren Rudman and Barry Irwin

77
Context-Aware Mobile Application for Mobile Devices

Mfundo Masango, Francois Mouton, Alastair Nottingham and Jabu Mtsweni

85
Team Formation in Digital Forensics

Wynand van Staden and Etienne van der Poel

91
Social Network Phishing: Becoming Habituated To Clicks and Ignorant To Threats?

Edwin Donald Frauenstein and Stephen Flowerday

98
Identity Management for e-Government (Libya as a case study)

Othoman Elaswad and Christian D. Jensen

106
Recognizing Surgically Altered Faces using Local Edge Gradient Gabor Magnitude Pattern

Chollette Olisah and Peter Ogedebe

114
Adaptable Exploit Detection through Scalable NetFlow Analysis

Alan Herbert and Barry Irwin

121
Unsupervised Learning for Robust Bitcoin Fraud Detection

Patrick Monamo, Vukosi Marivate and Bhekisipho Twala

129