Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Reinhardt A. Botha
@article{DBLP:journals/imcs/RensburgBS22, author = {Ebenhaeser Otto Janse van Rensburg and Reinhardt A. Botha and Rossouw von Solms}, title = {Utility indicator for emotion detection in a speaker authentication system}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {5}, pages = {672--686}, year = {2022}, url = {https://doi.org/10.1108/ICS-07-2021-0097}, doi = {10.1108/ICS-07-2021-0097}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/RensburgBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/BothaF21, author = {Reinhardt A. Botha and Steven Furnell}, title = {Facing up to security and privacy in online meetings}, journal = {Netw. Secur.}, volume = {2021}, number = {5}, pages = {7--13}, year = {2021}, url = {https://doi.org/10.1016/S1353-4858(21)00052-0}, doi = {10.1016/S1353-4858(21)00052-0}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/BothaF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/MokobaneB20, author = {Ntsewa B. Mokobane and Reinhardt A. Botha}, editor = {Nathan L. Clarke and Steven Furnell}, title = {Does Ubuntu Influence Social Engineering Susceptibility?}, booktitle = {Human Aspects of Information Security and Assurance - 14th {IFIP} {WG} 11.12 International Symposium, {HAISA} 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {593}, pages = {97--108}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57404-8\_8}, doi = {10.1007/978-3-030-57404-8\_8}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/haisa/MokobaneB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icicm/ManjeziB19, author = {Zandile Manjezi and Reinhardt A. Botha}, title = {From Concept to Practice: Untangling the Direct-Control Cycle}, booktitle = {Proceedings of the 9th International Conference on Information Communication and Management, {ICICM} 2019, Prague, Czech Republic, August 23-26, 2019}, pages = {101--105}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3357419.3357427}, doi = {10.1145/3357419.3357427}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icicm/ManjeziB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/LeppanBN18, author = {Ronald George Leppan and Reinhardt A. Botha and Johan F. Van Niekerk}, title = {Process Model for Differentiated Instruction using Learning Analytics}, journal = {South Afr. Comput. J.}, volume = {30}, number = {2}, year = {2018}, url = {https://doi.org/10.18489/sacj.v30i2.481}, doi = {10.18489/SACJ.V30I2.481}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/LeppanBN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ManjeziB18, author = {Zandile Manjezi and Reinhardt A. Botha}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Preventing and Mitigating Ransomware - {A} Systematic Literature Review}, booktitle = {Information Security - 17th International Conference, {ISSA} 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {973}, pages = {149--162}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11407-7\_11}, doi = {10.1007/978-3-030-11407-7\_11}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/ManjeziB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigite/BothaM17, author = {Reinhardt A. Botha and Russell E. McMahon}, editor = {Stephen J. Zilora and Tom Ayers and Daniel S. Bogaard}, title = {Reflections on Curriculating a South African Information Technology Degree}, booktitle = {Proceedings of the 18th Annual Conference on Information Technology Education and the 6th Annual Conference on Research in Information Technology, {SIGITE/RIIT} 2017, Rochester, New York, USA, October 4-7, 2017}, pages = {69}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3125659.3125667}, doi = {10.1145/3125659.3125667}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigite/BothaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conf-irm/MooiB16, author = {Roderick Mooi and Reinhardt A. Botha}, title = {Prioritizing computer security incident response services for the South African National Research Network (SANReN)}, booktitle = {{CONF-IRM} 2016, The International Conference on Information Resources Management: Digital Emancipation in a Networked Society, Cape Town, South Africa, May 18-20, 2016}, pages = {27}, year = {2016}, url = {http://aisel.aisnet.org/confirm2016/27}, timestamp = {Mon, 07 Nov 2016 15:02:30 +0100}, biburl = {https://dblp.org/rec/conf/conf-irm/MooiB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/giq/ThomasBG15, author = {Godwin Thomas and Reinhardt A. Botha and Darell van Greunen}, title = {Understanding the problem of coordination in a large scale distributed environment from a service lens view - Towards the South African public sector e-Administration criteria for coordination support}, journal = {Gov. Inf. Q.}, volume = {32}, number = {4}, pages = {526--538}, year = {2015}, url = {https://doi.org/10.1016/j.giq.2015.08.002}, doi = {10.1016/J.GIQ.2015.08.002}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/giq/ThomasBG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MooiB15, author = {Roderick Mooi and Reinhardt A. Botha}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Prerequisites for building a Computer Security Incident Response capability}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335057}, doi = {10.1109/ISSA.2015.7335057}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MooiB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/TschersichB14, author = {Markus Tschersich and Reinhardt A. Botha}, editor = {Michel Avital and Jan Marco Leimeister and Ulrike Schultze}, title = {Exploring the Impact of Restrictive Default Privacy Settings on the Privacy Calculus on Social Network sites}, booktitle = {22st European Conference on Information Systems, {ECIS} 2014, Tel Aviv, Israel, June 9-11, 2014}, year = {2014}, url = {http://aisel.aisnet.org/ecis2014/proceedings/track14/11}, timestamp = {Tue, 28 Oct 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/TschersichB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/inc/OphoffB14, author = {Jacques Ophoff and Reinhardt A. Botha}, editor = {Paul Dowland and Steven Furnell and Bogdan V. Ghita}, title = {A Privacy-Aware Model for Communications Management in the {IP} Multimedia Subsystem}, booktitle = {Tenth International Network Conference, {INC} 2014, Plymouth, UK, July 8-10, 2014. Proceedings}, pages = {117--126}, publisher = {Plymouth University}, year = {2014}, url = {http://www.cscan.org/openaccess/?paperid=220}, timestamp = {Tue, 16 May 2023 22:42:08 +0200}, biburl = {https://dblp.org/rec/conf/inc/OphoffB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/TekeniTB14, author = {Luzuko Tekeni and Kerry{-}Lynn Thomson and Reinhardt A. Botha}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Concerns regarding service authorization by {IP} address using eduroam}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950495}, doi = {10.1109/ISSA.2014.6950495}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/TekeniTB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaaiss/HaskinsB13, author = {Bertram Haskins and Reinhardt A. Botha}, title = {Identifying Tag Word Counterparts for Dr. Math}, booktitle = {Analyzing Microtext, Papers from the 2013 {AAAI} Spring Symposium, Palo Alto, California, USA, March 25-27, 2013}, series = {{AAAI} Technical Report}, volume = {{SS-13-01}}, publisher = {{AAAI}}, year = {2013}, url = {http://www.aaai.org/ocs/index.php/SSS/SSS13/paper/view/5717}, timestamp = {Mon, 09 Sep 2013 15:08:42 +0200}, biburl = {https://dblp.org/rec/conf/aaaiss/HaskinsB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africon/ButgereitB13, author = {Laurie L. Butgereit and Reinhardt A. Botha}, title = {Predictable patterns in microtext as seen in educational applications using MXit in South Africa}, booktitle = {{AFRICON} 2013, Pointe aux Piments, Mauritius, September 9-12, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/AFRCON.2013.6757588}, doi = {10.1109/AFRCON.2013.6757588}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africon/ButgereitB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/TschersichB13, author = {Markus Tschersich and Reinhardt A. Botha}, title = {Understanding the impact of default privacy settings on self-disclosure in social networking services: Building a conceptual model and measurement instrument}, booktitle = {19th Americas Conference on Information Systems, {AMCIS} 2013, Chicago, Illinois, USA, August 15-17, 2013}, publisher = {Association for Information Systems}, year = {2013}, url = {http://aisel.aisnet.org/amcis2013/ISSecurity/GeneralPresentations/11}, timestamp = {Tue, 28 Oct 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcis/TschersichB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/ButgereitB13, author = {Laurie L. Butgereit and Reinhardt A. Botha}, title = {An architecture for synchronous micro-volunteering in Africa using social media}, booktitle = {2013 {IEEE} International Conference on Pervasive Computing and Communications Workshops, {PERCOM} 2013 Workshops, San Diego, CA, USA, March 18-22, 2013}, pages = {175--180}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PerComW.2013.6529477}, doi = {10.1109/PERCOMW.2013.6529477}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/ButgereitB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saicsit/ButgereitB13, author = {Laurie L. Butgereit and Reinhardt A. Botha}, editor = {John McNeill and Karen L. Bradshaw and Philip Machanick and Mosiuoa Tsietsi}, title = {A comparison of different calculations for N-gram similarities in a spelling corrector for mobile instant messaging language}, booktitle = {2013 South African Institute for Computer Scientists and Information Technologists, {SAICSIT} '13, East London, South Africa, October 7-9, 2013}, pages = {1--7}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2513456.2513458}, doi = {10.1145/2513456.2513458}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saicsit/ButgereitB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/inc/GossB12, author = {Ryan G. Goss and Reinhardt A. Botha}, editor = {Reinhardt A. Botha and Paul Dowland and Steven Furnell}, title = {Establishing discernible flow characteristics for accurate, real-time network protocol identification}, booktitle = {Ninth International Network Conference {(INC} 2012), Port Elizabeth, South Africa, July 11-12, 2012. Proceedings}, pages = {25--34}, publisher = {University of Plymouth}, year = {2012}, url = {http://www.cscan.org/?page=openaccess\&\#38;id=140}, timestamp = {Tue, 16 May 2023 22:42:08 +0200}, biburl = {https://dblp.org/rec/conf/inc/GossB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NtlatywaBH12, author = {Phumezo Ntlatywa and Reinhardt A. Botha and Bertram Haskins}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Claimed vs observed information disclosure on social networking sites}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320443}, doi = {10.1109/ISSA.2012.6320443}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/NtlatywaBH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/NtlatywaBH12, author = {Phumezo Ntlatywa and Reinhardt A. Botha and Bertram Haskins}, title = {Factors that Influence the Choice of Privacy Settings on Facebook: Freshmen's View at a South African University}, booktitle = {2012 International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2012, and 2012 International Confernece on Social Computing, SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012}, pages = {843--850}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SocialCom-PASSAT.2012.36}, doi = {10.1109/SOCIALCOM-PASSAT.2012.36}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/NtlatywaBH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/inc/2012, editor = {Reinhardt A. Botha and Paul Dowland and Steven Furnell}, title = {Ninth International Network Conference {(INC} 2012), Port Elizabeth, South Africa, July 11-12, 2012. Proceedings}, publisher = {University of Plymouth}, year = {2012}, url = {http://www.cscan.org/?page=openaccess\&\#38;eid=1}, isbn = {978-1-84102-315-1}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/inc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GossB11, author = {Ryan Gavin Goss and Reinhardt A. Botha}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Traffic Management in Next Generation Service Provider Networks - Are We There Yet?}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/38\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GossB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saicsit/ButgereitB11, author = {Laurie L. Butgereit and Reinhardt A. Botha}, editor = {Irwin Brown and Kosheek Sewchurran and Hussein Suleman}, title = {Using N-grams to identify mathematical topics in MXit lingo}, booktitle = {Proceedings of the 2011 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, {SAICSIT} 2011, Cape Town, South Africa, October 3-5, 2011}, pages = {40--48}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2072221.2072227}, doi = {10.1145/2072221.2072227}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saicsit/ButgereitB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip6/ButgereitB10, author = {Laurie L. Butgereit and Reinhardt A. Botha}, editor = {Ana Pont and Guy Pujolle and S. V. Raghavan}, title = {C\({}^{\mbox{3}}\)TO: {A} Scalable Architecture for Mobile Tutoring over Cell Phones}, booktitle = {Communications: Wireless in Developing Countries and Networks of the Future - Third {IFIP} {TC} 6 International Conference, {WCITD} 2010 and {IFIP} {TC} 6 International Conference, {NF} 2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {327}, pages = {15--25}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15476-8\_3}, doi = {10.1007/978-3-642-15476-8\_3}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip6/ButgereitB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip8/ThomasB10, author = {Godwin Thomas and Reinhardt A. Botha}, editor = {Marijn Janssen and Winfried Lamersdorf and Jan Pries{-}Heje and Michael Rosemann}, title = {Virtual Communities as a Mechanism for Sustainable Coordination within the South African Public Sector}, booktitle = {E-Government, E-Services and Global Processes - Joint {IFIP} {TC} 8 and {TC} 6 International Conferences, {EGES} 2010 and {GISP} 2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {334}, pages = {62--75}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15346-4\_6}, doi = {10.1007/978-3-642-15346-4\_6}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip8/ThomasB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GossB10, author = {Ryan G. Goss and Reinhardt A. Botha}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Deep Packet Inspection - Fear of the Unknown}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/34\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GossB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saicsit/ButgereitB10, author = {Laurie L. Butgereit and Reinhardt A. Botha}, editor = {Paula Kotz{\'{e}} and Alta van der Merwe and Aurona Gerber}, title = {A busyness model for assigning tutors to pupils in a mobile, online tutoring system: a look at C\({}^{\mbox{3}}\)TO}, booktitle = {Proceedings of the 2010 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, {SAICSIT} 2010, Bela Bela, South Africa, October 11-13, 2010}, series = {{ACM} International Conference Proceeding Series}, pages = {350--355}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1899503.1899543}, doi = {10.1145/1899503.1899543}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saicsit/ButgereitB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BothaFC09, author = {Reinhardt A. Botha and Steven Furnell and Nathan L. Clarke}, title = {From desktop to mobile: Examining the security experience}, journal = {Comput. Secur.}, volume = {28}, number = {3-4}, pages = {130--137}, year = {2009}, url = {https://doi.org/10.1016/j.cose.2008.11.001}, doi = {10.1016/J.COSE.2008.11.001}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BothaFC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/VictorRB09, author = {Rudi Victor and Andrew Rutherford and Reinhardt A. Botha}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Enhanced Presence Handling}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {309--326}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/29\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/VictorRB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/OphoffB08, author = {Jacobus A. Ophoff and Reinhardt A. Botha}, title = {Mobile communications: user perception and practice}, journal = {South Afr. Comput. J.}, volume = {40}, pages = {63--73}, year = {2008}, url = {http://reference.sabinet.co.za/document/EJC28045}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/OphoffB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/RutherfordB08, author = {Andrew Rutherford and Reinhardt A. Botha}, editor = {Marten van Sinderen and Jo{\~{a}}o Paulo A. Almeida and Lu{\'{\i}}s Ferreira Pires and Maarten Steen}, title = {Towards Enhanced Presence Filtering}, booktitle = {Workshops Proceedings of the 12th International {IEEE} Enterprise Distributed Object Computing Conference, {ECOCW} 2008, 16 September 2008, Munich, Germany}, pages = {159--166}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EDOCW.2008.61}, doi = {10.1109/EDOCW.2008.61}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/RutherfordB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/saicsit/2008, editor = {Reinhardt A. Botha and Charmain Cilliers}, title = {Proceedings of the 2008 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on {IT} Research in Developing Countries, {SAICSIT} 2008, Wilderness, South Africa, October 6-8, 2008}, series = {{ACM} International Conference Proceeding Series}, volume = {338}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-60558-286-3}, timestamp = {Tue, 04 Oct 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/saicsit/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ism/ThomasB07, author = {Godwin Thomas and Reinhardt A. Botha}, title = {Secure Mobile Device Use in Healthcare Guidance from {HIPAA} and {ISO17799}}, journal = {Inf. Syst. Manag.}, volume = {24}, number = {4}, pages = {333--342}, year = {2007}, url = {https://doi.org/10.1080/10580530701586060}, doi = {10.1080/10580530701586060}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ism/ThomasB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/saicsit/2007, editor = {Lynette Barnard and Reinhardt A. Botha}, title = {Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on {IT} Research in Developing Countries, {SAICSIT} 2007, Port Elizabeth, South Africa, October 2-3, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {226}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-775-9}, timestamp = {Tue, 04 Oct 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/saicsit/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BothaG06, author = {Reinhardt A. Botha and Tshepo G. Gaadingwe}, title = {Reflecting on 20 {SEC} conferences}, journal = {Comput. Secur.}, volume = {25}, number = {4}, pages = {247--256}, year = {2006}, url = {https://doi.org/10.1016/j.cose.2006.04.002}, doi = {10.1016/J.COSE.2006.04.002}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BothaG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwmc/OphoffB06, author = {Jacobus A. Ophoff and Reinhardt A. Botha}, editor = {Petre Dini and Christer {\AA}hlund and Cosmin Dini and Eugen Borcoci}, title = {Privacy-enhancing Call Management in an IP-based Infrastructure}, booktitle = {Proceedings of the Second International Conference on Wireless and Mobile Communications (ICWMC'06), Bucharest, Romania, July 29-31, 2006}, pages = {42}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICWMC.2006.77}, doi = {10.1109/ICWMC.2006.77}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icwmc/OphoffB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OphoffPB06, author = {Jacobus A. Ophoff and Stephen Perelson and Reinhardt A. Botha}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {A Model for Secure Value-Added Service Subscriptions in Cellular Networks}, booktitle = {Proceedings of the {ISSA} 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa}, pages = {1--9}, publisher = {ISSA, Pretoria, South Africa}, year = {2006}, url = {http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/60\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/OphoffPB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/OphoffB05, author = {Jacobus A. Ophoff and Reinhardt A. Botha}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Revisiting Reachability Management as a Multilateral Security Mechanism}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/011\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/OphoffB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/BothaE02, author = {Reinhardt A. Botha and Jan H. P. Eloff}, title = {An access control architecture for {XML} documents in workflow environments}, journal = {South Afr. Comput. J.}, volume = {28}, pages = {3--10}, year = {2002}, url = {http://reference.sabinet.co.za/document/EJC27925}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/BothaE02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Botha02, author = {Reinhardt A. Botha}, editor = {Adeeb Ghonaimy and Mahmoud T. El{-}Hadidi and Heba Kamal Aslan}, title = {Towards Semantic Integrity in Rational Databases}, booktitle = {Security in the Information Society: Visions and Perspectives, {IFIP} {TC11} 17\({}^{\mbox{th}}\) International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt}, series = {{IFIP} Conference Proceedings}, volume = {214}, pages = {287--298}, publisher = {Kluwer}, year = {2002}, timestamp = {Fri, 11 Feb 2005 12:53:42 +0100}, biburl = {https://dblp.org/rec/conf/sec/Botha02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BothaE01, author = {Reinhardt A. Botha and Jan H. P. Eloff}, title = {Access Control in Document-centric Workflow Systems An Agent-based Approach}, journal = {Comput. Secur.}, volume = {20}, number = {6}, pages = {525--532}, year = {2001}, url = {https://doi.org/10.1016/S0167-4048(01)00613-7}, doi = {10.1016/S0167-4048(01)00613-7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BothaE01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ibmsj/BothaE01, author = {Reinhardt A. Botha and Jan H. P. Eloff}, title = {Separation of duties for access control enforcement in workflow environments}, journal = {{IBM} Syst. J.}, volume = {40}, number = {3}, pages = {666--682}, year = {2001}, url = {https://doi.org/10.1147/sj.403.0666}, doi = {10.1147/SJ.403.0666}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ibmsj/BothaE01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BothaE01, author = {Reinhardt A. Botha and Jan H. P. Eloff}, title = {A framework for access control in workflow systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {3}, pages = {126--133}, year = {2001}, url = {https://doi.org/10.1108/09685220110394848}, doi = {10.1108/09685220110394848}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/BothaE01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/PerelsonBE01, author = {Stephen Perelson and Reinhardt A. Botha and Jan H. P. Eloff}, title = {Separation of Duty administration}, journal = {South Afr. Comput. J.}, volume = {27}, pages = {64--69}, year = {2001}, url = {http://reference.sabinet.co.za/document/EJC27909}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/PerelsonBE01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/BothaE01, author = {Reinhardt A. Botha and Jan H. P. Eloff}, title = {Designing Role Hierarchies for Access Control in Workflow Systems}, booktitle = {25th International Computer Software and Applications Conference {(COMPSAC} 2001), Invigorating Software Development, 8-12 October 2001, Chicago, IL, {USA}}, pages = {117--122}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/CMPSAC.2001.960606}, doi = {10.1109/CMPSAC.2001.960606}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/BothaE01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/PapenfusB00, author = {C. Papenfus and Reinhardt A. Botha}, title = {An {XML} based approach to enforcing history-based separation of duty policies in heterogeneous workflow environments}, journal = {South Afr. Comput. J.}, volume = {26}, pages = {60--68}, year = {2000}, url = {http://reference.sabinet.co.za/document/EJC27901}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/PapenfusB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/PerelsonB00, author = {Stephen Perelson and Reinhardt A. Botha}, title = {Conflict analysis as a means of enforcing static separation of duty requirements in workflow environments}, journal = {South Afr. Comput. J.}, volume = {26}, pages = {212--216}, year = {2000}, url = {http://reference.sabinet.co.za/document/EJC27881}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/PerelsonB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/CholewkaBE00, author = {Damian G. Cholewka and Reinhardt A. Botha and Jan H. P. Eloff}, editor = {Sihan Qing and Jan H. P. Eloff}, title = {A Context-Sensitive Access Control Model and Prototype Implementation}, booktitle = {Information Security for Global Information Infrastructures, {IFIP} {TC11} Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China}, series = {{IFIP} Conference Proceedings}, volume = {175}, pages = {341--350}, publisher = {Kluwer}, year = {2000}, timestamp = {Fri, 06 Sep 2002 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/CholewkaBE00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.