Lessons Learnt in the Process of Computerization, Automation and Management of ICT Security in the Developing World: A Case Study of The University of Dar Es Salaam, Tanzania. [Citation Graph (, )][DBLP]
Bloom's Taxonomy for Information Security Education. [Citation Graph (, )][DBLP]
An Introduction to Standards related to Information Security. [Citation Graph (, )][DBLP]
The Principle of Security Safeguards: Accidental Activities. [Citation Graph (, )][DBLP]
A Novel Security Metrics Taxonomy for R&D Organisations. [Citation Graph (, )][DBLP]
Spam Over Internet Telephony and How to Deal with it. [Citation Graph (, )][DBLP]
A User Centric Model for Online Identity and Access Management. [Citation Graph (, )][DBLP]
Collective Improvisation: Complementing Information Security Frameworks with Self-Policing. [Citation Graph (, )][DBLP]
The Information Security of a Bluetooth-Enabled Handheld Device. [Citation Graph (, )][DBLP]
Immune System Based Intrusion Detection System. [Citation Graph (, )][DBLP]
Towards a Framework for a Network Warfare Capability. [Citation Graph (, )][DBLP]
UML Modelling of Digital Forensic Process Models (DFPMs). [Citation Graph (, )][DBLP]
The IP Protection of Electronic Databases: Copyright or Copywrong? [Citation Graph (, )][DBLP]
A Proof-of-Concept Implementation of EAP-TLS with TPM Support. [Citation Graph (, )][DBLP]
Computer Monitoring in the 21st Century Workplace. [Citation Graph (, )][DBLP]
Emerging Framework for The Evaluation of Open Source Security Tools. [Citation Graph (, )][DBLP]
Password Management: Empirical Results from a RSA and USA Study. [Citation Graph (, )][DBLP]