BibTeX records: Kamil Reddy

download as .bib file

@article{DBLP:journals/compsec/ReddyV13,
  author       = {Kamil Reddy and
                  Hein S. Venter},
  title        = {The architecture of a digital forensic readiness management system},
  journal      = {Comput. Secur.},
  volume       = {32},
  pages        = {73--89},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2012.09.008},
  doi          = {10.1016/J.COSE.2012.09.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ReddyV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/ReddyVO12,
  author       = {Kamil Reddy and
                  H. S. Venter and
                  Martin S. Olivier},
  title        = {Using time-driven activity-based costing to manage digital forensic
                  readiness in large organisations},
  journal      = {Inf. Syst. Frontiers},
  volume       = {14},
  number       = {5},
  pages        = {1061--1077},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10796-011-9333-x},
  doi          = {10.1007/S10796-011-9333-X},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/ReddyVO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/ReddyV10,
  author       = {Kamil Reddy and
                  Hein S. Venter},
  editor       = {Ahmed K. Elmagarmid and
                  Divyakant Agrawal},
  title        = {Information Privacy in Two Dimensions - Towards a Classification Scheme
                  for Information Privacy Research},
  booktitle    = {Proceedings of the 2010 {IEEE} Second International Conference on
                  Social Computing, SocialCom / {IEEE} International Conference on Privacy,
                  Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
                  August 20-22, 2010},
  pages        = {973--980},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SocialCom.2010.144},
  doi          = {10.1109/SOCIALCOM.2010.144},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/ReddyV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/ReddyV09,
  author       = {Kamil Reddy and
                  Hein S. Venter},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {A Forensic Framework for Handling Information Privacy Incidents},
  booktitle    = {Advances in Digital Forensics {V} - Fifth {IFIP} {WG} 11.9 International
                  Conference on Digital Forensics, Orlando, Florida, USA, January 26-28,
                  2009, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {306},
  pages        = {143--155},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04155-6\_11},
  doi          = {10.1007/978-3-642-04155-6\_11},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/ReddyV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securware/ReddyV09,
  author       = {Kamil Reddy and
                  Hein S. Venter},
  editor       = {Rainer Falk and
                  Wilson Goudalo and
                  Eric Y. Chen and
                  Reijo Savola and
                  Manuela Popescu},
  title        = {Using Object-Oriented Concepts to Develop a High-Level Information
                  Privacy Risk Management Model},
  booktitle    = {The Third International Conference on Emerging Security Information,
                  Systems and Technologies, {SECURWARE} 2009, 18-23 June 2009, Athens/Glyfada,
                  Greece},
  pages        = {23--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SECURWARE.2009.11},
  doi          = {10.1109/SECURWARE.2009.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securware/ReddyV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ReddyVOC08,
  author       = {Kamil Reddy and
                  H. S. Venter and
                  Martin S. Olivier and
                  Iain Currie},
  editor       = {Larry Korba and
                  Stephen Marsh and
                  Reihaneh Safavi{-}Naini},
  title        = {Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection
                  of Consumer Information Privacy},
  booktitle    = {Sixth Annual Conference on Privacy, Security and Trust, {PST} 2008,
                  October 1-3, 2008, Fredericton, New Brunswick, Canada},
  pages        = {56--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PST.2008.18},
  doi          = {10.1109/PST.2008.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ReddyVOC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}