BibTeX records: Marthie Grobler

download as .bib file

@article{DBLP:journals/cybersecurity/WhittyMG24,
  author       = {Monica T. Whitty and
                  Nour Moustafa and
                  Marthie Grobler},
  title        = {Cybersecurity when working from home during {COVID-19:} considering
                  the human factors},
  journal      = {J. Cybersecur.},
  volume       = {10},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1093/cybsec/tyae001},
  doi          = {10.1093/CYBSEC/TYAE001},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/WhittyMG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TangCWLGX24,
  author       = {Lihong Tang and
                  Xiao Chen and
                  Sheng Wen and
                  Li Li and
                  Marthie Grobler and
                  Yang Xiang},
  title        = {Demystifying the Evolution of Android Malware Variants},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {3324--3341},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3325912},
  doi          = {10.1109/TDSC.2023.3325912},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TangCWLGX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-17092,
  author       = {Van Nguyen and
                  Tingmin Wu and
                  Xingliang Yuan and
                  Marthie Grobler and
                  Surya Nepal and
                  Carsten Rudolph},
  title        = {A Pioneering Study and An Innovative Information Theory-based Approach
                  to Enhance The Transparency in Phishing Detection},
  journal      = {CoRR},
  volume       = {abs/2402.17092},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.17092},
  doi          = {10.48550/ARXIV.2402.17092},
  eprinttype    = {arXiv},
  eprint       = {2402.17092},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-17092.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-05964,
  author       = {Van Nguyen and
                  Xingliang Yuan and
                  Tingmin Wu and
                  Surya Nepal and
                  Marthie Grobler and
                  Carsten Rudolph},
  title        = {Deep Learning-Based Out-of-distribution Source Code Data Identification:
                  How Far Have We Gone?},
  journal      = {CoRR},
  volume       = {abs/2404.05964},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.05964},
  doi          = {10.48550/ARXIV.2404.05964},
  eprinttype    = {arXiv},
  eprint       = {2404.05964},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-05964.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SHRG23,
  author       = {Ahmad Salehi S. and
                  Runchao Han and
                  Carsten Rudolph and
                  Marthie Grobler},
  title        = {{DACP:} Enforcing a dynamic access control policy in cross-domain
                  environments},
  journal      = {Comput. Networks},
  volume       = {237},
  pages        = {110049},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.110049},
  doi          = {10.1016/J.COMNET.2023.110049},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/SHRG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ShahrakiLGSR23,
  author       = {Ahmad Salehi Shahraki and
                  Hagen Lauer and
                  Marthie Grobler and
                  Amin Sakzad and
                  Carsten Rudolph},
  title        = {Access Control, Key Management, and Trust for Emerging Wireless Body
                  Area Networks},
  journal      = {Sensors},
  volume       = {23},
  number       = {24},
  pages        = {9856},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23249856},
  doi          = {10.3390/S23249856},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/ShahrakiLGSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NosouhiYSGJDS23,
  author       = {Mohammad Reza Nosouhi and
                  Shui Yu and
                  Keshav Sood and
                  Marthie Grobler and
                  Raja Jurdak and
                  Ali Dorri and
                  Shigen Shen},
  title        = {UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {1},
  pages        = {242--255},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2021.3130952},
  doi          = {10.1109/TDSC.2021.3130952},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/NosouhiYSGJDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TangWCWLXGX23,
  author       = {Lihong Tang and
                  Tingmin Wu and
                  Xiao Chen and
                  Sheng Wen and
                  Li Li and
                  Xin Xia and
                  Marthie Grobler and
                  Yang Xiang},
  title        = {How Does Visualisation Help App Practitioners Analyse Android Apps?},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2238--2255},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3178181},
  doi          = {10.1109/TDSC.2022.3178181},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TangWCWLXGX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangBLNGCK23,
  author       = {Yanjun Zhang and
                  Guangdong Bai and
                  Xue Li and
                  Surya Nepal and
                  Marthie Grobler and
                  Chen Chen and
                  Ryan K. L. Ko},
  title        = {Preserving Privacy for Distributed Genome-Wide Analysis Against Identity
                  Tracing Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {4},
  pages        = {3341--3357},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3186672},
  doi          = {10.1109/TDSC.2022.3186672},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangBLNGCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/ChhetriLGHRA23,
  author       = {Mohan Baruwal Chhetri and
                  Xiao Liu and
                  Marthie Grobler and
                  Thuong N. Hoang and
                  Karen Renaud and
                  Chetan Arora},
  title        = {Report on the 4th Workshop on Human-Centric Software Engineering {\&}
                  Cyber Security (HCSE{\&}CS 2023)},
  booktitle    = {38th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2023 - Workshops, Luxembourg, September 11-15, 2023},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ASEW60602.2023.00033},
  doi          = {10.1109/ASEW60602.2023.00033},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/ChhetriLGHRA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/AamirCCG23,
  author       = {Tooba Aamir and
                  Mohan Baruwal Chhetri and
                  M. A. P. Chamikara and
                  Marthie Grobler},
  title        = {Government Mobile Apps: Analysing Citizen Feedback via App Reviews},
  booktitle    = {38th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2023, Luxembourg, September 11-15, 2023},
  pages        = {1858--1863},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ASE56229.2023.00190},
  doi          = {10.1109/ASE56229.2023.00190},
  timestamp    = {Thu, 16 Nov 2023 09:03:51 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/AamirCCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JiangJNGZB22,
  author       = {Liuyue Jiang and
                  Asangi Jayatilaka and
                  Mehwish Nasim and
                  Marthie Grobler and
                  Mansooreh Zahedi and
                  Muhammad Ali Babar},
  title        = {Systematic Literature Review on Cyber Situational Awareness Visualizations},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {57525--57554},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3178195},
  doi          = {10.1109/ACCESS.2022.3178195},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JiangJNGZB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fdata/NepalKGC22,
  author       = {Surya Nepal and
                  Ryan K. L. Ko and
                  Marthie Grobler and
                  L. Jean Camp},
  title        = {Editorial: Human-Centric Security and Privacy},
  journal      = {Frontiers Big Data},
  volume       = {5},
  pages        = {848058},
  year         = {2022},
  url          = {https://doi.org/10.3389/fdata.2022.848058},
  doi          = {10.3389/FDATA.2022.848058},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fdata/NepalKGC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/ChhetriLGHRM22,
  author       = {Mohan Baruwal Chhetri and
                  Xiao Liu and
                  Marthie Grobler and
                  Thuong N. Hoang and
                  Karen Renaud and
                  Jennifer McIntosh},
  title        = {Report on the 2nd Workshop on Human Centric Software Engineering {\&}
                  Cyber Security (HCSE{\&}CS 2021)},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {47},
  number       = {2},
  pages        = {12--14},
  year         = {2022},
  url          = {https://doi.org/10.1145/3520273.3520278},
  doi          = {10.1145/3520273.3520278},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigsoft/ChhetriLGHRM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangNARG22,
  author       = {Shuo Wang and
                  Surya Nepal and
                  Alsharif Abuadbba and
                  Carsten Rudolph and
                  Marthie Grobler},
  title        = {Adversarial Detection by Latent Style Transformations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {1099--1114},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3155975},
  doi          = {10.1109/TIFS.2022.3155975},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangNARG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/NosouhiSGD22,
  author       = {Mohammad Reza Nosouhi and
                  Keshav Sood and
                  Marthie Grobler and
                  Robin Doss},
  title        = {Towards Spoofing Resistant Next Generation IoT Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {1669--1683},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3170276},
  doi          = {10.1109/TIFS.2022.3170276},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/NosouhiSGD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/WangNMGRA22,
  author       = {Shuo Wang and
                  Surya Nepal and
                  Kristen Moore and
                  Marthie Grobler and
                  Carsten Rudolph and
                  Alsharif Abuadbba},
  title        = {{OCTOPUS:} Overcoming Performance and Privatization Bottlenecks in
                  Distributed Learning},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {33},
  number       = {12},
  pages        = {3460--3477},
  year         = {2022},
  url          = {https://doi.org/10.1109/TPDS.2022.3157258},
  doi          = {10.1109/TPDS.2022.3157258},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/WangNMGRA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/WangNRGCC22,
  author       = {Shuo Wang and
                  Surya Nepal and
                  Carsten Rudolph and
                  Marthie Grobler and
                  Shangyu Chen and
                  Tianle Chen},
  title        = {Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning
                  Models},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {3},
  pages        = {1526--1539},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2020.3000900},
  doi          = {10.1109/TSC.2020.3000900},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/WangNRGCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/WangNRGCCA22,
  author       = {Shuo Wang and
                  Surya Nepal and
                  Carsten Rudolph and
                  Marthie Grobler and
                  Shangyu Chen and
                  Tianle Chen and
                  Zike An},
  title        = {Defending Adversarial Attacks via Semantic Feature Manipulation},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {6},
  pages        = {3184--3197},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2021.3090365},
  doi          = {10.1109/TSC.2021.3090365},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/WangNRGCCA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChamikaraLCNGBK22,
  author       = {Mahawaga Arachchige Pathum Chamikara and
                  Dongxi Liu and
                  Seyit Camtepe and
                  Surya Nepal and
                  Marthie Grobler and
                  Peter Bert{\'{o}}k and
                  Ibrahim Khalil},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Local Differential Privacy for Federated Learning},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13554},
  pages        = {195--216},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17140-6\_10},
  doi          = {10.1007/978-3-031-17140-6\_10},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ChamikaraLCNGBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/JeongGP22,
  author       = {Jongkil Jeong and
                  Marthie Grobler and
                  M. A. P. Chamikara},
  title        = {Simplifying Cyber Security Maturity Models through National Culture:
                  {A} Fuzzy Logic Approach},
  booktitle    = {55th Hawaii International Conference on System Sciences, {HICSS} 2022,
                  Virtual Event / Maui, Hawaii, USA, January 4-7, 2022},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2022},
  url          = {http://hdl.handle.net/10125/80000},
  timestamp    = {Thu, 16 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/JeongGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SellakCHG22,
  author       = {Hamza Sellak and
                  Mohan Baruwal Chhetri and
                  Zijin Huang and
                  Marthie Grobler},
  title        = {Smart Contract-based Consensus Building for Collaborative Medical
                  Decision-Making},
  booktitle    = {55th Hawaii International Conference on System Sciences, {HICSS} 2022,
                  Virtual Event / Maui, Hawaii, USA, January 4-7, 2022},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2022},
  url          = {http://hdl.handle.net/10125/79602},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/SellakCHG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/WangQRNG22,
  author       = {Shuo Wang and
                  Jinyuan Qin and
                  Carsten Rudolph and
                  Surya Nepal and
                  Marthie Grobler},
  title        = {R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential
                  Privacy},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2022, Padua,
                  Italy, July 18-23, 2022},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IJCNN55064.2022.9892663},
  doi          = {10.1109/IJCNN55064.2022.9892663},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/WangQRNG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/TonkinKGN22,
  author       = {Adam Tonkin and
                  William Kosasih and
                  Marthie Grobler and
                  Mehwish Nasim},
  title        = {Simulating cyber security management: {A} gamified approach to executive
                  decision making},
  booktitle    = {37th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2022, Rochester, MI, USA, October 10-14, 2022},
  pages        = {222:1--222:8},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3551349.3561148},
  doi          = {10.1145/3551349.3561148},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/TonkinKGN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/HilowleYGPJ22,
  author       = {Malyun Muhudin Hilowle and
                  William Yeoh and
                  Marthie Grobler and
                  Graeme Pye and
                  Frank Jiang},
  title        = {Towards Improving the Adoption and Usage of National Digital Identity
                  Systems},
  booktitle    = {37th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2022, Rochester, MI, USA, October 10-14, 2022},
  pages        = {223:1--223:6},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3551349.3561144},
  doi          = {10.1145/3551349.3561144},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/HilowleYGPJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-06053,
  author       = {M. A. P. Chamikara and
                  Dongxi Liu and
                  Seyit Camtepe and
                  Surya Nepal and
                  Marthie Grobler and
                  Peter Bert{\'{o}}k and
                  Ibrahim Khalil},
  title        = {Local Differential Privacy for Federated Learning in Industrial Settings},
  journal      = {CoRR},
  volume       = {abs/2202.06053},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.06053},
  eprinttype    = {arXiv},
  eprint       = {2202.06053},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-06053.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-10320,
  author       = {Reena Zelenkova and
                  Jack Swallow and
                  M. A. P. Chamikara and
                  Dongxi Liu and
                  Mohan Baruwal Chhetri and
                  Seyit Camtepe and
                  Marthie Grobler and
                  Mahathir Almashor},
  title        = {Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks
                  in Face Recognition to Prevent Potential Privacy Breaches},
  journal      = {CoRR},
  volume       = {abs/2202.10320},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.10320},
  eprinttype    = {arXiv},
  eprint       = {2202.10320},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-10320.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/behaviourIT/WijayarathnaGA21,
  author       = {Chamila Wijayarathna and
                  Marthie Grobler and
                  Nalin A. G. Arachchilage},
  title        = {Software developers need help too! Developing a methodology to analyse
                  cognitive dimension-based feedback on usability},
  journal      = {Behav. Inf. Technol.},
  volume       = {40},
  number       = {6},
  pages        = {506--527},
  year         = {2021},
  url          = {https://doi.org/10.1080/0144929X.2019.1705393},
  doi          = {10.1080/0144929X.2019.1705393},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/behaviourIT/WijayarathnaGA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fdata/GroblerGN21,
  author       = {Marthie Grobler and
                  Raj Gaire and
                  Surya Nepal},
  title        = {User, Usage and Usability: Redefining Human Centric Cyber Security},
  journal      = {Frontiers Big Data},
  volume       = {4},
  pages        = {583723},
  year         = {2021},
  url          = {https://doi.org/10.3389/fdata.2021.583723},
  doi          = {10.3389/FDATA.2021.583723},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fdata/GroblerGN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iwc/AlkhatibKWBGW21,
  author       = {Sami Alkhatib and
                  Ryan Kelly and
                  Jenny Waycott and
                  George Buchanan and
                  Marthie Grobler and
                  Shuo Wang},
  title        = {"Who Wants to Know all this Stuff?!": Understanding Older
                  Adults' Privacy Concerns in Aged Care Monitoring Devices},
  journal      = {Interact. Comput.},
  volume       = {33},
  number       = {5},
  pages        = {481--498},
  year         = {2021},
  url          = {https://doi.org/10.1093/iwc/iwab029},
  doi          = {10.1093/IWC/IWAB029},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iwc/AlkhatibKWBGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/GroblerCAJNP21,
  author       = {Marthie Grobler and
                  M. A. P. Chamikara and
                  Jacob Abbott and
                  Jongkil Jay Jeong and
                  Surya Nepal and
                  C{\'{e}}cile Paris},
  title        = {The importance of social identity on password formulations},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {25},
  number       = {5},
  pages        = {813--827},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00779-020-01477-1},
  doi          = {10.1007/S00779-020-01477-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/GroblerCAJNP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/RuanYPMLG21,
  author       = {Zichan Ruan and
                  Shuiqiao Yang and
                  Lei Pan and
                  Xingjun Ma and
                  Wei Luo and
                  Marthie Grobler},
  title        = {Microwave Link Failures Prediction via LSTM-based Feature Fusion Network},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen,
                  China, July 18-22, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IJCNN52387.2021.9533814},
  doi          = {10.1109/IJCNN52387.2021.9533814},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcnn/RuanYPMLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/SellakCGM21,
  author       = {Hamza Sellak and
                  Mohan Baruwal Chhetri and
                  Marthie Grobler and
                  Kristen Moore},
  title        = {{ACSIMA:} {A} Cyber Security Index for Mobile Health Apps},
  booktitle    = {36th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2021 - Workshops, Melbourne, Australia, November 15-19, 2021},
  pages        = {145--152},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ASEW52652.2021.00039},
  doi          = {10.1109/ASEW52652.2021.00039},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/SellakCGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-00602,
  author       = {Shuo Wang and
                  Surya Nepal and
                  Kristen Moore and
                  Marthie Grobler and
                  Carsten Rudolph and
                  Alsharif Abuadbba},
  title        = {{OCTOPUS:} Overcoming Performance andPrivatization Bottlenecks in
                  Distributed Learning},
  journal      = {CoRR},
  volume       = {abs/2105.00602},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.00602},
  eprinttype    = {arXiv},
  eprint       = {2105.00602},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-00602.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-04070,
  author       = {Shuo Wang and
                  Lingjuan Lyu and
                  Surya Nepal and
                  Carsten Rudolph and
                  Marthie Grobler and
                  Kristen Moore},
  title        = {Robust Training Using Natural Transformation},
  journal      = {CoRR},
  volume       = {abs/2105.04070},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.04070},
  eprinttype    = {arXiv},
  eprint       = {2105.04070},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-04070.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-10354,
  author       = {Liuyue Jiang and
                  Asangi Jayatilaka and
                  Mehwish Nasim and
                  Marthie Grobler and
                  Mansooreh Zahedi and
                  Muhammad Ali Babar},
  title        = {Systematic Literature Review on Cyber Situational Awareness Visualizations},
  journal      = {CoRR},
  volume       = {abs/2112.10354},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.10354},
  eprinttype    = {arXiv},
  eprint       = {2112.10354},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-10354.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/NosouhiYZGK20,
  author       = {Mohammad Reza Nosouhi and
                  Shui Yu and
                  Wanlei Zhou and
                  Marthie Grobler and
                  Habiba Keshtiar},
  title        = {Blockchain for secure location verification},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {136},
  pages        = {40--51},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jpdc.2019.10.007},
  doi          = {10.1016/J.JPDC.2019.10.007},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/NosouhiYZGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/NosouhiSYGZ20,
  author       = {Mohammad Reza Nosouhi and
                  Keshav Sood and
                  Shui Yu and
                  Marthie Grobler and
                  Jingwen Zhang},
  title        = {{PASPORT:} {A} Secure and Private Location Proof Generation and Verification
                  Framework},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {7},
  number       = {2},
  pages        = {293--307},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSS.2019.2960534},
  doi          = {10.1109/TCSS.2019.2960534},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcss/NosouhiSYGZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/SellakCG20,
  author       = {Hamza Sellak and
                  Mohan Baruwal Chhetri and
                  Marthie Grobler},
  editor       = {Honghao Gao and
                  Xinheng Wang and
                  Muddesar Iqbal and
                  Yuyu Yin and
                  Jianwei Yin and
                  Ning Gu},
  title        = {Towards a Trusted Collaborative Medical Decision-Making Platform},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing
                  - 16th {EAI} International Conference, CollaborateCom 2020, Shanghai,
                  China, October 16-18, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {350},
  pages        = {407--418},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-67540-0\_25},
  doi          = {10.1007/978-3-030-67540-0\_25},
  timestamp    = {Wed, 13 Jul 2022 15:43:13 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/SellakCG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icann/WangRNGC20,
  author       = {Shuo Wang and
                  Carsten Rudolph and
                  Surya Nepal and
                  Marthie Grobler and
                  Shangyu Chen},
  editor       = {Igor Farkas and
                  Paolo Masulli and
                  Stefan Wermter},
  title        = {{PART-GAN:} Privacy-Preserving Time-Series Sharing},
  booktitle    = {Artificial Neural Networks and Machine Learning - {ICANN} 2020 - 29th
                  International Conference on Artificial Neural Networks, Bratislava,
                  Slovakia, September 15-18, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12396},
  pages        = {578--593},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61609-0\_46},
  doi          = {10.1007/978-3-030-61609-0\_46},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icann/WangRNGC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/WangCCNRG20,
  author       = {Shuo Wang and
                  Tianle Chen and
                  Shangyu Chen and
                  Surya Nepal and
                  Carsten Rudolph and
                  Marthie Grobler},
  title        = {{OIAD:} One-for-all Image Anomaly Detection with Disentanglement Learning},
  booktitle    = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020,
                  Glasgow, United Kingdom, July 19-24, 2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IJCNN48605.2020.9207434},
  doi          = {10.1109/IJCNN48605.2020.9207434},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/WangCCNRG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/SellakG20,
  author       = {Hamza Sellak and
                  Marthie Grobler},
  editor       = {John Grundy and
                  Claire Le Goues and
                  David Lo},
  title        = {mHealth4U: designing for health and wellbeing self-management},
  booktitle    = {35th {IEEE/ACM} International Conference on Automated Software Engineering
                  Workshops, {ASE} Workshops 2020, Melbourne, Australia, September 21-25,
                  2020},
  pages        = {41--46},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3417113.3422179},
  doi          = {10.1145/3417113.3422179},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/SellakG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ozchi/AlkhatibWBGW20,
  author       = {Sami Alkhatib and
                  Jenny Waycott and
                  George Buchanan and
                  Marthie Grobler and
                  Shuo Wang},
  editor       = {Naseem Ahmadpour and
                  Tuck Wah Leong and
                  Bernd Ploderer and
                  Callum Parker and
                  Sarah Webber and
                  Diego Mu{\~{n}}oz and
                  Lian Loke and
                  Martin Tomitsch},
  title        = {Privacy by Design in Aged Care Monitoring Devices? Well, Not Quite
                  Yet!},
  booktitle    = {OzCHI '20: 32nd Australian Conference on Human-Computer-Interaction,
                  Sydney, NSW, Australia, 2-4 December, 2020},
  pages        = {492--505},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3441000.3441049},
  doi          = {10.1145/3441000.3441049},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ozchi/AlkhatibWBGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SRG20,
  author       = {Ahmad Salehi S. and
                  Carsten Rudolph and
                  Marthie Grobler},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {Attribute-Based Data Access Control for Multi-Authority System},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {1834--1841},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00251},
  doi          = {10.1109/TRUSTCOM50675.2020.00251},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SRG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wise/WangLCCNRG20,
  author       = {Shuo Wang and
                  Lingjuan Lyu and
                  Tianle Chen and
                  Shangyu Chen and
                  Surya Nepal and
                  Carsten Rudolph and
                  Marthie Grobler},
  editor       = {Zhisheng Huang and
                  Wouter Beek and
                  Hua Wang and
                  Rui Zhou and
                  Yanchun Zhang},
  title        = {Privacy-Preserving Data Generation and Sharing Using Identification
                  Sanitizer},
  booktitle    = {Web Information Systems Engineering - {WISE} 2020 - 21st International
                  Conference, Amsterdam, The Netherlands, October 20-24, 2020, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12343},
  pages        = {185--200},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62008-0\_13},
  doi          = {10.1007/978-3-030-62008-0\_13},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wise/WangLCCNRG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-02297,
  author       = {Shuo Wang and
                  Shangyu Chen and
                  Tianle Chen and
                  Surya Nepal and
                  Carsten Rudolph and
                  Marthie Grobler},
  title        = {Generating Semantic Adversarial Examples via Feature Manipulation},
  journal      = {CoRR},
  volume       = {abs/2001.02297},
  year         = {2020},
  url          = {http://arxiv.org/abs/2001.02297},
  eprinttype    = {arXiv},
  eprint       = {2001.02297},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-02297.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-03274,
  author       = {Shuo Wang and
                  Surya Nepal and
                  Carsten Rudolph and
                  Marthie Grobler and
                  Shangyu Chen and
                  Tianle Chen},
  title        = {Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning
                  Models},
  journal      = {CoRR},
  volume       = {abs/2001.03274},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.03274},
  eprinttype    = {arXiv},
  eprint       = {2001.03274},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-03274.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-06640,
  author       = {Shuo Wang and
                  Tianle Chen and
                  Shangyu Chen and
                  Carsten Rudolph and
                  Surya Nepal and
                  Marthie Grobler},
  title        = {{OIAD:} One-for-all Image Anomaly Detection with Disentanglement Learning},
  journal      = {CoRR},
  volume       = {abs/2001.06640},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.06640},
  eprinttype    = {arXiv},
  eprint       = {2001.06640},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-06640.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-02007,
  author       = {Shuo Wang and
                  Tianle Chen and
                  Surya Nepal and
                  Carsten Rudolph and
                  Marthie Grobler and
                  Shangyu Chen},
  title        = {Defending Adversarial Attacks via Semantic Feature Manipulation},
  journal      = {CoRR},
  volume       = {abs/2002.02007},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.02007},
  eprinttype    = {arXiv},
  eprint       = {2002.02007},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-02007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-09701,
  author       = {Shuo Wang and
                  Surya Nepal and
                  Marthie Grobler and
                  Carsten Rudolph and
                  Tianle Chen and
                  Shangyu Chen},
  title        = {Adversarial Defense by Latent Style Transformations},
  journal      = {CoRR},
  volume       = {abs/2006.09701},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.09701},
  eprinttype    = {arXiv},
  eprint       = {2006.09701},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-09701.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TangMGMWW19,
  author       = {Lihong Tang and
                  Wanlun Ma and
                  Marthie Grobler and
                  Weizhi Meng and
                  Yu Wang and
                  Sheng Wen},
  title        = {Faces are Protected as Privacy: An Automatic Tagging Framework Against
                  Unpermitted Photo Sharing in Social Media},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {75556--75567},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2921029},
  doi          = {10.1109/ACCESS.2019.2921029},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/TangMGMWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/WuTZWPNGX19,
  author       = {Tingmin Wu and
                  Lihong Tang and
                  Rongjunchen Zhang and
                  Sheng Wen and
                  C{\'{e}}cile Paris and
                  Surya Nepal and
                  Marthie Grobler and
                  Yang Xiang},
  title        = {Catering to Your Concerns: Automatic Generation of Personalised Security-Centric
                  Descriptions for Android Apps},
  journal      = {{ACM} Trans. Cyber Phys. Syst.},
  volume       = {3},
  number       = {4},
  pages        = {36:1--36:21},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317699},
  doi          = {10.1145/3317699},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcps/WuTZWPNGX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SenarathGA19,
  author       = {Awanthika Senarath and
                  Marthie Grobler and
                  Nalin Asanka Gamagedara Arachchilage},
  title        = {Will They Use It or Not? Investigating Software Developers' Intention
                  to Follow Privacy Engineering Methodologies},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {23:1--23:30},
  year         = {2019},
  url          = {https://doi.org/10.1145/3364224},
  doi          = {10.1145/3364224},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SenarathGA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/JeongGCR19,
  author       = {Jongkil Jay Jeong and
                  Marthie Grobler and
                  M. A. P. Chamikara and
                  Carsten Rudolph},
  title        = {Fuzzy Logic Application to Link National Culture and Cybersecurity
                  Maturity},
  booktitle    = {5th {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2019, Los Angeles, CA, USA, December 12-14, 2019},
  pages        = {330--337},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CIC48465.2019.00046},
  doi          = {10.1109/CIC48465.2019.00046},
  timestamp    = {Fri, 27 May 2022 15:04:14 +0200},
  biburl       = {https://dblp.org/rec/conf/coinco/JeongGCR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/CampGJPRW19,
  author       = {L. Jean Camp and
                  Marthie Grobler and
                  Julian Jang{-}Jaccard and
                  Christian Probst and
                  Karen Renaud and
                  Paul A. Watters},
  editor       = {Tung Bui},
  title        = {Measuring Human Resilience in the Face of the Global Epidemiology
                  of Cyber Attacks},
  booktitle    = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019,
                  Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2019},
  url          = {https://hdl.handle.net/10125/59914},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/CampGJPRW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SenarathGA19,
  author       = {Awanthika Senarath and
                  Marthie Grobler and
                  Nalin A. G. Arachchilage},
  editor       = {Tung Bui},
  title        = {A Model for System Developers to Measure the Privacy Risk of Data},
  booktitle    = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019,
                  Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2019},
  url          = {https://hdl.handle.net/10125/60048},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/SenarathGA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/SRG19,
  author       = {Ahmad Salehi S. and
                  Carsten Rudolph and
                  Marthie Grobler},
  editor       = {Joe Betser and
                  Carol J. Fung and
                  Alex Clemm and
                  J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Shingo Ata},
  title        = {A Dynamic Cross-Domain Access Control Model for Collaborative Healthcare
                  Application},
  booktitle    = {{IFIP/IEEE} International Symposium on Integrated Network Management,
                  {IM} 2019, Washington, DC, USA, April 09-11, 2019},
  pages        = {643--648},
  publisher    = {{IFIP}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/document/8717924},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/SRG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NosouhiYSG19,
  author       = {Mohammad Reza Nosouhi and
                  Shui Yu and
                  Keshav Sood and
                  Marthie Grobler},
  title        = {HSDC-Net: Secure Anonymous Messaging in Online Social Networks},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {350--357},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00054},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00054},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/NosouhiYSG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShahrakiRG19,
  author       = {Ahmad Salehi Shahraki and
                  Carsten Rudolph and
                  Marthie Grobler},
  title        = {A Dynamic Access Control Policy Model for Sharing of Healthcare Data
                  in Multiple Domains},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {618--625},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00088},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00088},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShahrakiRG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/NosouhiYGXZ18,
  author       = {Mohammad Reza Nosouhi and
                  Shui Yu and
                  Marthie Grobler and
                  Yong Xiang and
                  Zuqing Zhu},
  title        = {{SPARSE:} Privacy-Aware and Collusion Resistant Location Proof Generation
                  and Verification},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi,
                  United Arab Emirates, December 9-13, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/GLOCOM.2018.8647933},
  doi          = {10.1109/GLOCOM.2018.8647933},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/NosouhiYGXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-07070,
  author       = {Tingmin Wu and
                  Lihong Tang and
                  Zhiyu Xu and
                  Sheng Wen and
                  C{\'{e}}cile Paris and
                  Surya Nepal and
                  Marthie Grobler and
                  Yang Xiang},
  title        = {Catering to Your Concerns: Automatic Generation of Personalised Security-Centric
                  Descriptions for Android Apps},
  journal      = {CoRR},
  volume       = {abs/1805.07070},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.07070},
  eprinttype    = {arXiv},
  eprint       = {1805.07070},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-07070.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-09566,
  author       = {Jongkil Kim and
                  Jonathon M. Smereka and
                  Calvin Cheung and
                  Surya Nepal and
                  Marthie Grobler},
  title        = {Security and Performance Considerations in {ROS} 2: {A} Balancing
                  Act},
  journal      = {CoRR},
  volume       = {abs/1809.09566},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.09566},
  eprinttype    = {arXiv},
  eprint       = {1809.09566},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-09566.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-10884,
  author       = {Awanthika Senarath and
                  Marthie Grobler and
                  Nalin Asanka Gamagedara Arachchilage},
  title        = {A model for system developers to measure the privacy risk of data},
  journal      = {CoRR},
  volume       = {abs/1809.10884},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.10884},
  eprinttype    = {arXiv},
  eprint       = {1809.10884},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-10884.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GcazaSGV17,
  author       = {Noluxolo Gcaza and
                  Rossouw von Solms and
                  Marthie Grobler and
                  Joey Jansen van Vuuren},
  title        = {A general morphological analysis: delineating a cyber-security culture},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {259--278},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-12-2015-0046},
  doi          = {10.1108/ICS-12-2015-0046},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GcazaSGV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wise/TangMWGXZ17,
  author       = {Lihong Tang and
                  Wanlun Ma and
                  Sheng Wen and
                  Marthie Grobler and
                  Yang Xiang and
                  Wanlei Zhou},
  editor       = {Athman Bouguettaya and
                  Yunjun Gao and
                  Andrey Klimenko and
                  Lu Chen and
                  Xiangliang Zhang and
                  Fedor Dzerzhinskiy and
                  Weijia Jia and
                  Stanislav V. Klimenko and
                  Qing Li},
  title        = {My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos
                  in Social Media},
  booktitle    = {Web Information Systems Engineering - {WISE} 2017 - 18th International
                  Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10570},
  pages        = {528--539},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68786-5\_42},
  doi          = {10.1007/978-3-319-68786-5\_42},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wise/TangMWGXZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/SwartIG16,
  author       = {Ignatius Swart and
                  Barry Irwin and
                  Marthie Grobler},
  title        = {Adaptation of the {JDL} Model for Multi-Sensor National Cyber Security
                  Data Fusion},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {6},
  number       = {3},
  pages        = {17--30},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJCWT.2016070102},
  doi          = {10.4018/IJCWT.2016070102},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/SwartIG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hcc/BothaEG16,
  author       = {Johnny Botha and
                  Mariki M. Eloff and
                  Marthie Grobler},
  editor       = {David Kreps and
                  Gordon Fletcher and
                  Marie Griffiths},
  title        = {Ethical and Legal Issues Involved in the Pro-active Collection of
                  Personal Information with the Aim of Reducing Online Disclosure},
  booktitle    = {Technology and Intimacy: Choice or Coercion - 12th {IFIP} {TC} 9 International
                  Conference on Human Choice and Computers, {HCC12} 2016, Salford, UK,
                  September 7-9, 2016, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {474},
  pages        = {72--85},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44805-3\_7},
  doi          = {10.1007/978-3-319-44805-3\_7},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hcc/BothaEG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/VeerasamyG15,
  author       = {Namosha Veerasamy and
                  Marthie Grobler},
  title        = {Logic Tester for the Classification of Cyberterrorism Attacks},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {5},
  number       = {1},
  pages        = {30--46},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJCWT.2015010103},
  doi          = {10.4018/IJCWT.2015010103},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/VeerasamyG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hcc/GroblerS14,
  author       = {Marthie Grobler and
                  Ignus P. Swart},
  editor       = {Kai Kimppa and
                  Diane Whitehouse and
                  Tiina Kuusela and
                  Jackie Phahlamohlaka},
  title        = {On the Probability of Predicting and Mapping Traditional Warfare Measurements
                  to the Cyber Warfare Domain},
  booktitle    = {{ICT} and Society - 11th {IFIP} {TC} 9 International Conference on
                  Human Choice and Computers, {HCC11} 2014, Turku, Finland, July 30
                  - August 1, 2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {431},
  pages        = {239--254},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44208-1\_20},
  doi          = {10.1007/978-3-662-44208-1\_20},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hcc/GroblerS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hcc/VuurenGLP14,
  author       = {Joey Jansen van Vuuren and
                  Marthie Grobler and
                  Louise Leenen and
                  Jackie Phahlamohlaka},
  editor       = {Kai Kimppa and
                  Diane Whitehouse and
                  Tiina Kuusela and
                  Jackie Phahlamohlaka},
  title        = {Proposed Model for a Cybersecurity Centre of Innovation for South
                  Africa},
  booktitle    = {{ICT} and Society - 11th {IFIP} {TC} 9 International Conference on
                  Human Choice and Computers, {HCC11} 2014, Turku, Finland, July 30
                  - August 1, 2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {431},
  pages        = {293--306},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44208-1\_24},
  doi          = {10.1007/978-3-662-44208-1\_24},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hcc/VuurenGLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SwartIG14,
  author       = {Ignus P. Swart and
                  Barry Irwin and
                  Marthie Grobler},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Towards a platform to visualize the state of South Africa's information
                  security},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950511},
  doi          = {10.1109/ISSA.2014.6950511},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SwartIG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saicsit/SwartIG14,
  author       = {Ignus P. Swart and
                  Barry Irwin and
                  Marthie Grobler},
  editor       = {Carina de Villiers and
                  Alta van der Merwe and
                  Jacobus Philippus van Deventer and
                  M. C. Matthee and
                  Helene Gelderblom and
                  Aurona Gerber},
  title        = {On the viability of pro-active automated {PII} breach detection: {A}
                  South African case study},
  booktitle    = {Southern African Institute for Computer Scientist and Information
                  Technologists Annual Conference 2014, {SAICSIT} '14, Centurion, South
                  Africa, September 29 - October 1, 2014},
  pages        = {251},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664591.2664600},
  doi          = {10.1145/2664591.2664600},
  timestamp    = {Fri, 30 Dec 2022 11:13:31 +0100},
  biburl       = {https://dblp.org/rec/conf/saicsit/SwartIG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SwartGI13,
  author       = {Ignus P. Swart and
                  Marthie Grobler and
                  Barry Irwin},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Visualization of a data leak},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641046},
  doi          = {10.1109/ISSA.2013.6641046},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SwartGI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/VuurenGZ12,
  author       = {Joey Jansen van Vuuren and
                  Marthie Grobler and
                  Jannie Zaaiman},
  title        = {Cyber Security Awareness as Critical Driver to National Security},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {1},
  pages        = {27--38},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012010103},
  doi          = {10.4018/IJCWT.2012010103},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/VuurenGZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Grobler12,
  author       = {Marthie Grobler},
  title        = {The Need for Digital Evidence Standardisation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {2},
  pages        = {1--12},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012040101},
  doi          = {10.4018/JDCF.2012040101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Grobler12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MouhtaropoulosLG12,
  author       = {Antonis Mouhtaropoulos and
                  Chang{-}Tsun Li and
                  Marthie Grobler},
  editor       = {Nasrullah Memon and
                  Daniel Zeng},
  title        = {Proactive Digital Forensics: The Ever-Increasing Need for Standardization},
  booktitle    = {2012 European Intelligence and Security Informatics Conference, {EISIC}
                  2012, Odense, Denmark, August 22-24, 2012},
  pages        = {289},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EISIC.2012.66},
  doi          = {10.1109/EISIC.2012.66},
  timestamp    = {Tue, 16 May 2023 16:54:39 +0200},
  biburl       = {https://dblp.org/rec/conf/eisic/MouhtaropoulosLG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hcc/GroblerVL12,
  author       = {Marthie Grobler and
                  Joey Jansen van Vuuren and
                  Louise Leenen},
  editor       = {Magda David Hercheui and
                  Diane Whitehouse and
                  William J. McIver Jr. and
                  Jackie Phahlamohlaka},
  title        = {Implementation of a Cyber Security Policy in South Africa: Reflection
                  on Progress and the Way Forward},
  booktitle    = {{ICT} Critical Infrastructures and Society - 10th {IFIP} {TC} 9 International
                  Conference on Human Choice and Computers, {HCC10} 2012, Amsterdam,
                  The Netherlands, September 27-28, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {386},
  pages        = {215--225},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33332-3\_20},
  doi          = {10.1007/978-3-642-33332-3\_20},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hcc/GroblerVL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/MouhtaropoulosGL11,
  author       = {Antonis Mouhtaropoulos and
                  Marthie Grobler and
                  Chang{-}Tsun Li},
  title        = {Digital Forensic Readiness: An Insight into Governmental and Academic
                  Initiatives},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {191--196},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.30},
  doi          = {10.1109/EISIC.2011.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/MouhtaropoulosGL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GroblerDNL11,
  author       = {Marthie Grobler and
                  Zama Dlamini and
                  Sipho Ngobeni and
                  Aubrey Labuschagne},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Towards a Cyber security aware rural community},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Grobler.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GroblerDNL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/Grobler10,
  author       = {Marthie Grobler},
  editor       = {Nathan L. Clarke and
                  Steven Furnell and
                  Rossouw von Solms},
  title        = {Digital forensic standards: international progress},
  booktitle    = {South African Information Security Multi-Conference, {SAISMC} 2010,
                  Port Elizabeth, South Africa, May 17-18, 2010. Proceedings},
  pages        = {261--271},
  publisher    = {University of Plymouth},
  year         = {2010},
  url          = {http://www.cscan.org/openaccess/?paperid=182},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/Grobler10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Grobler10,
  author       = {Marthie Grobler},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Phishing for Fortune},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/01\_paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Grobler10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GroblerB10,
  author       = {Marthie Grobler and
                  Harri Bryk},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Common problems faced during the establishment of a {CSIRT}},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/17\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GroblerB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GroblerV10,
  author       = {Marthie Grobler and
                  Joey Jansen van Vuuren},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Broadband broadens scope for cyber crime in Africa},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/28\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GroblerV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GroblerS09,
  author       = {Marthie Grobler and
                  Basie von Solms},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {A Best Practice Approach to Live Forensic Acquisition},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {3--13},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/1\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GroblerS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/NgobeniG09,
  author       = {Sipho Josia Ngobeni and
                  Marthie Grobler},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Les Labuschagne},
  title        = {Information Security Policies for Governmental Organisations, The
                  Minimum Criteria},
  booktitle    = {Information Security South Africa Conference 2009, School of Tourism
                  {\&} Hospitality, University of Johannesburg, Johannesburg, South
                  Africa, July 6-8, 2009. Proceedings {ISSA2009}},
  pages        = {455--466},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2009},
  url          = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/50.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/NgobeniG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdfia/DlaminiOG09,
  author       = {Innocentia Zamaswazi Dlamini and
                  Martin Olivier and
                  Marthie Grobler},
  editor       = {Nathan L. Clarke and
                  Theodore Tryfonas},
  title        = {A Simulation of Logical Traffic Isolation Using Differentiated Services},
  booktitle    = {4th International Workshop on Digital Forensics and Incident Analysis,
                  {WDFIA} 2009, Athens, Greece, June 25-26, 2009. Proceedings},
  pages        = {20--32},
  publisher    = {Plymouth University, {UK}},
  year         = {2009},
  url          = {http://www.cscan.org/openaccess/?paperid=71},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wdfia/DlaminiOG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}