1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249
| @INPROCEEDINGS{Mouton2010,
author = {Bezuidenhout, M. and Mouton, F. and Venter, H.S.},
title = {Social engineering attack detection model: SEADM},
booktitle = {Information Security for South Africa},
year = {2010},
pages = {1-8},
address = {Johannesburg, South Africa},
month = {August},
abstract = {Social engineering is a real threat to industries in this day and
age even though the severity of it is extremely downplayed. The difficulty
with social engineering attacks is mostly the ability to identify
them. Social engineers target call centre employees, as they are
normally underpaid, under skilled workers whom have limited knowledge
about the information technology infrastructure. These workers are
thus easy targets for the social engineer. This paper proposes a
model which can be used by these workers to detect social engineering
attacks in a call centre environment. The model is a quick and effective
way to determine if the requester is trying to manipulate an individual
into disclosing information to which the requester does not have
authorization for.},
doi = {10.1109/ISSA.2010.5588500},
file = {:jbar\\PDF\\Mouton2010.pdf:PDF},
keywords = {authorisation;call centres;personnel;authorization;call centre employee;information
technology infrastructure;social engineering attack detection model;Biological
system modeling;Cognition;Computational modeling;Decision making;Humans;Psychology;Utility
theory;Social engineering;emotional state;information sensitivity;social
psychology},
owner = {Fafa},
timestamp = {2014.10.16}
}
@INPROCEEDINGS{Burke2013,
author = {Burke, I.D. and Mouton, F.},
title = {An Investigation of the Current State of Mobile Device Management
Within South Africa},
booktitle = {8th International Conference on Information Warfare and Security},
year = {2013},
volume = {8},
address = {Colorado, USA},
month = {March},
owner = {Fafa},
timestamp = {2014.10.16}
}
@INPROCEEDINGS{Waal2013,
author = {{de Waal}, A. and Mouton, F.},
title = {Topic modelling in the information warfare domain},
booktitle = {International Conference on Adaptive Science and Technology (ICAST)},
year = {2013},
pages = {1-7},
month = {Nov},
abstract = {In this paper we provide context to Topic Modelling as an Information
Warfare technique. Topic modelling is a technique that discovers
latent topics in unstructured and unlabelled collection of documents.
The topic structure can be searched for interesting and relevant
topics. The objectives of this paper is to describe topic modelling,
put it in context as a useful IW technique and illustrate its use
with two examples. We discuss several applications of topic modelling
in the safety and security domain and list several topic model variations
that are of special interest to the IW domain.},
doi = {10.1109/ICASTech.2013.6707492},
keywords = {social networking (online);text analysis;IW technique;information
warfare domain;latent topics discovery;safety domain;security domain;text
analysis;topic modelling;topic structure search;unstructured-unlabelled
document collection;Adaptation models;Analytical models;Context;Data
models;Data visualization;Forensics;Visualization;information warfare;public
media;social networks;topic modelling;visualisation}
}
@ARTICLE{Malan2012,
author = {Malan, M.M. and Mouton, F.},
title = {Protecting e-mail anonymity with an Anonymizer Bouncer},
journal = {Journal of Information Warfare},
year = {2012},
volume = {11},
pages = {39--50},
number = {3},
month = {November},
owner = {Fafa},
timestamp = {2014.10.16}
}
@MASTERSTHESIS{Mouton2012a,
author = {F. Mouton},
title = {Digital Forensic Readiness for Wireless Sensor Network Environments},
school = {University of Pretoria},
year = {2012},
type = {MSc},
address = {Pretoria, South Africa},
month = {January}
}
@INPROCEEDINGS{Mouton2014a,
author = {Mouton, F. and Leenen, L. and Malan, M.M. and Venter, H.S.},
title = {Towards an Ontological Model Defining the Social Engineering Domain},
booktitle = {ICT and Society},
year = {2014},
editor = {Kimppa, Kai and Whitehouse, Diane and Kuusela, Tiina and Phahlamohlaka,
Jackie},
volume = {431},
series = {IFIP Advances in Information and Communication Technology},
pages = {266-279},
publisher = {Springer Berlin Heidelberg},
doi = {10.1007/978-3-662-44208-1_22},
isbn = {978-3-662-44207-4},
keywords = {Bidirectional Communication; Compliance Principles; Indirect Communication;
Ontology; Social Engineering Attack; Social Engineering Attack Ontology;
Social Engineering Definitions; Social Engineering History; Taxonomy;
Unidirectional Communication},
language = {English},
owner = {Fafa},
timestamp = {2014.10.16},
url = {http://dx.doi.org/10.1007/978-3-662-44208-1_22}
}
@INPROCEEDINGS{Mouton2014,
author = {F. Mouton and M.M. Malan and L. Leenen and H.S. Venter},
title = {Social Engineering Attack Framework},
booktitle = {Information Security for South Africa},
year = {2014},
pages = {1--9},
address = {Johannesburg, South Africa},
month = {August},
owner = {Fafa},
timestamp = {2014.07.01}
}
@INPROCEEDINGS{Mouton2013,
author = {Mouton, F and Malan, M.M. and Venter, H.S.},
title = {Social engineering from a normative ethics perspective},
booktitle = {Information Security for South Africa},
year = {2013},
pages = {1-8},
address = {Johannesburg, South Africa},
month = {August},
abstract = {Social engineering is deeply entrenched in both computer science and
social psychology. Knowledge on both of these disciplines is required
to perform social engineering based research. There are several ethical
concerns and requirements that need to be taken into account whilst
performing social engineering research on participants to ensure
that harm does not come to the participants. These requirements are
not yet formalised and most researchers are unaware of the ethical
concerns whilst performing social engineering research. This paper
identifies several ethical concerns regarding social engineering
in public communication, penetration testing and social engineering
research. This paper discusses the identified ethical concerns with
regards to two different normative ethics approaches namely utilitarianism
and deontology. All of the identified ethical concerns and their
corresponding ethical perspectives are provided as well as practical
examples of where these formalised ethical concerns for social engineering
research can be utilised.},
doi = {10.1109/ISSA.2013.6641064},
file = {:jbar\\PDF\\Mouton2013.pdf:PDF},
keywords = {Consequentialism;Deontology;Ethical Concerns;Ethics;Penetration Testing;Public
Communication;Social Engineering;Social Engineering Research;Utilitarianism},
owner = {Fafa},
timestamp = {2014.10.16}
}
@INPROCEEDINGS{Mouton2012,
author = {Mouton, F and Malan, M.M. and Venter, H.S.},
title = {Development of cognitive functioning psychological measures for the
SEADM},
booktitle = {Human Aspects of Information Security \& Assurance},
year = {2012},
address = {Crete, Greece},
month = {June},
file = {:jbar\\PDF\\Mouton2012.pdf:PDF},
owner = {Fafa},
timestamp = {2014.10.16}
}
@INPROCEEDINGS{Mouton2011a,
author = {Mouton, F. and Venter, H.S.},
title = {Requirements for wireless sensor networks in order to achieve digital
forensic readiness},
booktitle = {6th International Workshop on Digital Forensics and Incident Analysis},
year = {2011},
editor = {Clarke, N. and Tryfonas, T.},
pages = {108--121},
address = {London, UK},
month = {July},
isbn = {978-1-84102-285-7}
}
@INPROCEEDINGS{Mouton2011,
author = {Mouton, F. and Venter, H.S.},
title = {A prototype for achieving digital forensic readiness on wireless
sensor networks},
booktitle = {AFRICON, 2011},
year = {2011},
pages = {1--6},
address = {Livingstone, Zambia},
month = {Sept},
abstract = {The field of wireless sensor networking is still a new and upcoming
one and, unfortunately, still lacking in terms of digital forensics.
All communications between different nodes (also known as motes)
are sent out in a broadcast fashion. These broadcasts make it quite
difficult to capture data packets forensically whilst retaining integrity
and authenticity of the data packets. This paper examines whether
and how one can add a digital forensic readiness layer to an existing
IEEE 802.15.4 wireless sensor network without any modification to
the existing wireless sensor network. This paper also provides demonstrations
of a working prototype to show that a digital forensic readiness
layer can be added to an existing wireless sensor network, if the
prototype adheres to a list of requirements in order to achieve digital
forensic readiness in a wireless sensor network environment. This
is done by performing several demonstrations which resemble real
world wireless sensor network scenarios in order to show that the
prototype does indeed add a layer of digital forensic readiness to
the existing wireless sensor network.},
doi = {10.1109/AFRCON.2011.6072117},
issn = {2153-0025},
keywords = {Zigbee;computer forensics;wireless sensor networks;IEEE 802.15.4 wireless
sensor network;authenticity;broadcast;data packet;digital forensic
readiness;Base stations;Digital forensics;Prototypes;Temperature
measurement;Temperature sensors;Wireless communication;Wireless sensor
networks;digital forensic;forensic readiness;wireless sensor networks}
}
@INPROCEEDINGS{Mouton2009,
author = {Mouton, F. and Venter, H.S.},
title = {A Secure Communication Protocol for Wireless Sensor Networks},
booktitle = {Proceedings of the Annual Security Conference "Security Assurance
and Privacy: organizational challenges"},
year = {2009},
pages = {1--14},
address = {Las Vegas, Nevada},
month = {April}
}
@INPROCEEDINGS{Heerden2014,
author = {{van Heerden}, R. and Malan, M.M. and Mouton, F. and Irwin, B.},
title = {Human Perception of the Measurement of a Network Attack Taxonomy
in Near Real-Time},
booktitle = {ICT and Society},
year = {2014},
editor = {Kimppa, Kai and Whitehouse, Diane and Kuusela, Tiina and Phahlamohlaka,
Jackie},
volume = {431},
series = {IFIP Advances in Information and Communication Technology},
pages = {280-292},
publisher = {Springer Berlin Heidelberg},
doi = {10.1007/978-3-662-44208-1_23},
isbn = {978-3-662-44207-4},
keywords = {Network Attack; near real-time; Network Attack Taxonomy},
language = {English},
url = {http://dx.doi.org/10.1007/978-3-662-44208-1_23}
} |
Partager