Skip to main content
  • Conference proceedings
  • © 2019

Information Security

17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers

Part of the book series: Communications in Computer and Information Science (CCIS, volume 973)

Conference series link(s): ISSA: International Information Security Conference

Conference proceedings info: ISSA 2018.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (13 papers)

  1. Front Matter

    Pages I-XVI
  2. Real-Time Face Antispoofing Using Shearlets

    • Dustin Terence van der Haar
    Pages 16-29
  3. The Current State of Electronic Consent Systems in e-Health for Privacy Preservation

    • Lelethu Zazaza, H. S. Venter, George Sibiya
    Pages 76-88
  4. Detecting Manipulated Smartphone Data on Android and iOS Devices

    • Heloise Pieterse, Martin Olivier, Renier van Heerden
    Pages 89-103
  5. Preventing and Mitigating Ransomware

    • Zandile Manjezi, Reinhardt A. Botha
    Pages 149-162
  6. Back Matter

    Pages 193-193

Other Volumes

  1. Information Security

About this book

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018.

The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.

Editors and Affiliations

  • University of Pretoria, Pretoria, South Africa

    Hein Venter, Jan Eloff

  • University of South Africa, Florida, South Africa

    Marianne Loock

  • University of Johannesburg, Auckland Park, South Africa

    Marijke Coetzee

  • University of South Africa, Pretoria, South Africa

    Mariki Eloff

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access