default search action
BibTeX records: Marthie Grobler
@article{DBLP:journals/cybersecurity/WhittyMG24, author = {Monica T. Whitty and Nour Moustafa and Marthie Grobler}, title = {Cybersecurity when working from home during {COVID-19:} considering the human factors}, journal = {J. Cybersecur.}, volume = {10}, number = {1}, year = {2024}, url = {https://doi.org/10.1093/cybsec/tyae001}, doi = {10.1093/CYBSEC/TYAE001}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/WhittyMG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TangCWLGX24, author = {Lihong Tang and Xiao Chen and Sheng Wen and Li Li and Marthie Grobler and Yang Xiang}, title = {Demystifying the Evolution of Android Malware Variants}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {4}, pages = {3324--3341}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3325912}, doi = {10.1109/TDSC.2023.3325912}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TangCWLGX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-17092, author = {Van Nguyen and Tingmin Wu and Xingliang Yuan and Marthie Grobler and Surya Nepal and Carsten Rudolph}, title = {A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection}, journal = {CoRR}, volume = {abs/2402.17092}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.17092}, doi = {10.48550/ARXIV.2402.17092}, eprinttype = {arXiv}, eprint = {2402.17092}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-17092.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-05964, author = {Van Nguyen and Xingliang Yuan and Tingmin Wu and Surya Nepal and Marthie Grobler and Carsten Rudolph}, title = {Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far Have We Gone?}, journal = {CoRR}, volume = {abs/2404.05964}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.05964}, doi = {10.48550/ARXIV.2404.05964}, eprinttype = {arXiv}, eprint = {2404.05964}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-05964.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SHRG23, author = {Ahmad Salehi S. and Runchao Han and Carsten Rudolph and Marthie Grobler}, title = {{DACP:} Enforcing a dynamic access control policy in cross-domain environments}, journal = {Comput. Networks}, volume = {237}, pages = {110049}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.110049}, doi = {10.1016/J.COMNET.2023.110049}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/SHRG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ShahrakiLGSR23, author = {Ahmad Salehi Shahraki and Hagen Lauer and Marthie Grobler and Amin Sakzad and Carsten Rudolph}, title = {Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks}, journal = {Sensors}, volume = {23}, number = {24}, pages = {9856}, year = {2023}, url = {https://doi.org/10.3390/s23249856}, doi = {10.3390/S23249856}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/ShahrakiLGSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NosouhiYSGJDS23, author = {Mohammad Reza Nosouhi and Shui Yu and Keshav Sood and Marthie Grobler and Raja Jurdak and Ali Dorri and Shigen Shen}, title = {UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {1}, pages = {242--255}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2021.3130952}, doi = {10.1109/TDSC.2021.3130952}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/NosouhiYSGJDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TangWCWLXGX23, author = {Lihong Tang and Tingmin Wu and Xiao Chen and Sheng Wen and Li Li and Xin Xia and Marthie Grobler and Yang Xiang}, title = {How Does Visualisation Help App Practitioners Analyse Android Apps?}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {2238--2255}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3178181}, doi = {10.1109/TDSC.2022.3178181}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TangWCWLXGX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangBLNGCK23, author = {Yanjun Zhang and Guangdong Bai and Xue Li and Surya Nepal and Marthie Grobler and Chen Chen and Ryan K. L. Ko}, title = {Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {4}, pages = {3341--3357}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3186672}, doi = {10.1109/TDSC.2022.3186672}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangBLNGCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/ChhetriLGHRA23, author = {Mohan Baruwal Chhetri and Xiao Liu and Marthie Grobler and Thuong N. Hoang and Karen Renaud and Chetan Arora}, title = {Report on the 4th Workshop on Human-Centric Software Engineering {\&} Cyber Security (HCSE{\&}CS 2023)}, booktitle = {38th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2023 - Workshops, Luxembourg, September 11-15, 2023}, pages = {1--2}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ASEW60602.2023.00033}, doi = {10.1109/ASEW60602.2023.00033}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/ChhetriLGHRA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/AamirCCG23, author = {Tooba Aamir and Mohan Baruwal Chhetri and M. A. P. Chamikara and Marthie Grobler}, title = {Government Mobile Apps: Analysing Citizen Feedback via App Reviews}, booktitle = {38th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2023, Luxembourg, September 11-15, 2023}, pages = {1858--1863}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ASE56229.2023.00190}, doi = {10.1109/ASE56229.2023.00190}, timestamp = {Thu, 16 Nov 2023 09:03:51 +0100}, biburl = {https://dblp.org/rec/conf/kbse/AamirCCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JiangJNGZB22, author = {Liuyue Jiang and Asangi Jayatilaka and Mehwish Nasim and Marthie Grobler and Mansooreh Zahedi and Muhammad Ali Babar}, title = {Systematic Literature Review on Cyber Situational Awareness Visualizations}, journal = {{IEEE} Access}, volume = {10}, pages = {57525--57554}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3178195}, doi = {10.1109/ACCESS.2022.3178195}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JiangJNGZB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fdata/NepalKGC22, author = {Surya Nepal and Ryan K. L. Ko and Marthie Grobler and L. Jean Camp}, title = {Editorial: Human-Centric Security and Privacy}, journal = {Frontiers Big Data}, volume = {5}, pages = {848058}, year = {2022}, url = {https://doi.org/10.3389/fdata.2022.848058}, doi = {10.3389/FDATA.2022.848058}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fdata/NepalKGC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/ChhetriLGHRM22, author = {Mohan Baruwal Chhetri and Xiao Liu and Marthie Grobler and Thuong N. Hoang and Karen Renaud and Jennifer McIntosh}, title = {Report on the 2nd Workshop on Human Centric Software Engineering {\&} Cyber Security (HCSE{\&}CS 2021)}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {47}, number = {2}, pages = {12--14}, year = {2022}, url = {https://doi.org/10.1145/3520273.3520278}, doi = {10.1145/3520273.3520278}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigsoft/ChhetriLGHRM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangNARG22, author = {Shuo Wang and Surya Nepal and Alsharif Abuadbba and Carsten Rudolph and Marthie Grobler}, title = {Adversarial Detection by Latent Style Transformations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {1099--1114}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3155975}, doi = {10.1109/TIFS.2022.3155975}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangNARG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NosouhiSGD22, author = {Mohammad Reza Nosouhi and Keshav Sood and Marthie Grobler and Robin Doss}, title = {Towards Spoofing Resistant Next Generation IoT Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {1669--1683}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3170276}, doi = {10.1109/TIFS.2022.3170276}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NosouhiSGD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/WangNMGRA22, author = {Shuo Wang and Surya Nepal and Kristen Moore and Marthie Grobler and Carsten Rudolph and Alsharif Abuadbba}, title = {{OCTOPUS:} Overcoming Performance and Privatization Bottlenecks in Distributed Learning}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {33}, number = {12}, pages = {3460--3477}, year = {2022}, url = {https://doi.org/10.1109/TPDS.2022.3157258}, doi = {10.1109/TPDS.2022.3157258}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/WangNMGRA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/WangNRGCC22, author = {Shuo Wang and Surya Nepal and Carsten Rudolph and Marthie Grobler and Shangyu Chen and Tianle Chen}, title = {Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {3}, pages = {1526--1539}, year = {2022}, url = {https://doi.org/10.1109/TSC.2020.3000900}, doi = {10.1109/TSC.2020.3000900}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/WangNRGCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/WangNRGCCA22, author = {Shuo Wang and Surya Nepal and Carsten Rudolph and Marthie Grobler and Shangyu Chen and Tianle Chen and Zike An}, title = {Defending Adversarial Attacks via Semantic Feature Manipulation}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {6}, pages = {3184--3197}, year = {2022}, url = {https://doi.org/10.1109/TSC.2021.3090365}, doi = {10.1109/TSC.2021.3090365}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/WangNRGCCA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChamikaraLCNGBK22, author = {Mahawaga Arachchige Pathum Chamikara and Dongxi Liu and Seyit Camtepe and Surya Nepal and Marthie Grobler and Peter Bert{\'{o}}k and Ibrahim Khalil}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Local Differential Privacy for Federated Learning}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13554}, pages = {195--216}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17140-6\_10}, doi = {10.1007/978-3-031-17140-6\_10}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ChamikaraLCNGBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/JeongGP22, author = {Jongkil Jeong and Marthie Grobler and M. A. P. Chamikara}, title = {Simplifying Cyber Security Maturity Models through National Culture: {A} Fuzzy Logic Approach}, booktitle = {55th Hawaii International Conference on System Sciences, {HICSS} 2022, Virtual Event / Maui, Hawaii, USA, January 4-7, 2022}, pages = {1--10}, publisher = {ScholarSpace}, year = {2022}, url = {http://hdl.handle.net/10125/80000}, timestamp = {Thu, 16 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/JeongGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SellakCHG22, author = {Hamza Sellak and Mohan Baruwal Chhetri and Zijin Huang and Marthie Grobler}, title = {Smart Contract-based Consensus Building for Collaborative Medical Decision-Making}, booktitle = {55th Hawaii International Conference on System Sciences, {HICSS} 2022, Virtual Event / Maui, Hawaii, USA, January 4-7, 2022}, pages = {1--10}, publisher = {ScholarSpace}, year = {2022}, url = {http://hdl.handle.net/10125/79602}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/SellakCHG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/WangQRNG22, author = {Shuo Wang and Jinyuan Qin and Carsten Rudolph and Surya Nepal and Marthie Grobler}, title = {R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2022, Padua, Italy, July 18-23, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IJCNN55064.2022.9892663}, doi = {10.1109/IJCNN55064.2022.9892663}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/WangQRNG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/TonkinKGN22, author = {Adam Tonkin and William Kosasih and Marthie Grobler and Mehwish Nasim}, title = {Simulating cyber security management: {A} gamified approach to executive decision making}, booktitle = {37th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2022, Rochester, MI, USA, October 10-14, 2022}, pages = {222:1--222:8}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3551349.3561148}, doi = {10.1145/3551349.3561148}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/TonkinKGN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/HilowleYGPJ22, author = {Malyun Muhudin Hilowle and William Yeoh and Marthie Grobler and Graeme Pye and Frank Jiang}, title = {Towards Improving the Adoption and Usage of National Digital Identity Systems}, booktitle = {37th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2022, Rochester, MI, USA, October 10-14, 2022}, pages = {223:1--223:6}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3551349.3561144}, doi = {10.1145/3551349.3561144}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/HilowleYGPJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-06053, author = {M. A. P. Chamikara and Dongxi Liu and Seyit Camtepe and Surya Nepal and Marthie Grobler and Peter Bert{\'{o}}k and Ibrahim Khalil}, title = {Local Differential Privacy for Federated Learning in Industrial Settings}, journal = {CoRR}, volume = {abs/2202.06053}, year = {2022}, url = {https://arxiv.org/abs/2202.06053}, eprinttype = {arXiv}, eprint = {2202.06053}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-06053.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-10320, author = {Reena Zelenkova and Jack Swallow and M. A. P. Chamikara and Dongxi Liu and Mohan Baruwal Chhetri and Seyit Camtepe and Marthie Grobler and Mahathir Almashor}, title = {Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches}, journal = {CoRR}, volume = {abs/2202.10320}, year = {2022}, url = {https://arxiv.org/abs/2202.10320}, eprinttype = {arXiv}, eprint = {2202.10320}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-10320.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/behaviourIT/WijayarathnaGA21, author = {Chamila Wijayarathna and Marthie Grobler and Nalin A. G. Arachchilage}, title = {Software developers need help too! Developing a methodology to analyse cognitive dimension-based feedback on usability}, journal = {Behav. Inf. Technol.}, volume = {40}, number = {6}, pages = {506--527}, year = {2021}, url = {https://doi.org/10.1080/0144929X.2019.1705393}, doi = {10.1080/0144929X.2019.1705393}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/behaviourIT/WijayarathnaGA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fdata/GroblerGN21, author = {Marthie Grobler and Raj Gaire and Surya Nepal}, title = {User, Usage and Usability: Redefining Human Centric Cyber Security}, journal = {Frontiers Big Data}, volume = {4}, pages = {583723}, year = {2021}, url = {https://doi.org/10.3389/fdata.2021.583723}, doi = {10.3389/FDATA.2021.583723}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fdata/GroblerGN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iwc/AlkhatibKWBGW21, author = {Sami Alkhatib and Ryan Kelly and Jenny Waycott and George Buchanan and Marthie Grobler and Shuo Wang}, title = {"Who Wants to Know all this Stuff?!": Understanding Older Adults' Privacy Concerns in Aged Care Monitoring Devices}, journal = {Interact. Comput.}, volume = {33}, number = {5}, pages = {481--498}, year = {2021}, url = {https://doi.org/10.1093/iwc/iwab029}, doi = {10.1093/IWC/IWAB029}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iwc/AlkhatibKWBGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/GroblerCAJNP21, author = {Marthie Grobler and M. A. P. Chamikara and Jacob Abbott and Jongkil Jay Jeong and Surya Nepal and C{\'{e}}cile Paris}, title = {The importance of social identity on password formulations}, journal = {Pers. Ubiquitous Comput.}, volume = {25}, number = {5}, pages = {813--827}, year = {2021}, url = {https://doi.org/10.1007/s00779-020-01477-1}, doi = {10.1007/S00779-020-01477-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/GroblerCAJNP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/RuanYPMLG21, author = {Zichan Ruan and Shuiqiao Yang and Lei Pan and Xingjun Ma and Wei Luo and Marthie Grobler}, title = {Microwave Link Failures Prediction via LSTM-based Feature Fusion Network}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen, China, July 18-22, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IJCNN52387.2021.9533814}, doi = {10.1109/IJCNN52387.2021.9533814}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcnn/RuanYPMLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/SellakCGM21, author = {Hamza Sellak and Mohan Baruwal Chhetri and Marthie Grobler and Kristen Moore}, title = {{ACSIMA:} {A} Cyber Security Index for Mobile Health Apps}, booktitle = {36th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2021 - Workshops, Melbourne, Australia, November 15-19, 2021}, pages = {145--152}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ASEW52652.2021.00039}, doi = {10.1109/ASEW52652.2021.00039}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kbse/SellakCGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-00602, author = {Shuo Wang and Surya Nepal and Kristen Moore and Marthie Grobler and Carsten Rudolph and Alsharif Abuadbba}, title = {{OCTOPUS:} Overcoming Performance andPrivatization Bottlenecks in Distributed Learning}, journal = {CoRR}, volume = {abs/2105.00602}, year = {2021}, url = {https://arxiv.org/abs/2105.00602}, eprinttype = {arXiv}, eprint = {2105.00602}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-00602.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-04070, author = {Shuo Wang and Lingjuan Lyu and Surya Nepal and Carsten Rudolph and Marthie Grobler and Kristen Moore}, title = {Robust Training Using Natural Transformation}, journal = {CoRR}, volume = {abs/2105.04070}, year = {2021}, url = {https://arxiv.org/abs/2105.04070}, eprinttype = {arXiv}, eprint = {2105.04070}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-04070.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-10354, author = {Liuyue Jiang and Asangi Jayatilaka and Mehwish Nasim and Marthie Grobler and Mansooreh Zahedi and Muhammad Ali Babar}, title = {Systematic Literature Review on Cyber Situational Awareness Visualizations}, journal = {CoRR}, volume = {abs/2112.10354}, year = {2021}, url = {https://arxiv.org/abs/2112.10354}, eprinttype = {arXiv}, eprint = {2112.10354}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-10354.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/NosouhiYZGK20, author = {Mohammad Reza Nosouhi and Shui Yu and Wanlei Zhou and Marthie Grobler and Habiba Keshtiar}, title = {Blockchain for secure location verification}, journal = {J. Parallel Distributed Comput.}, volume = {136}, pages = {40--51}, year = {2020}, url = {https://doi.org/10.1016/j.jpdc.2019.10.007}, doi = {10.1016/J.JPDC.2019.10.007}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/NosouhiYZGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/NosouhiSYGZ20, author = {Mohammad Reza Nosouhi and Keshav Sood and Shui Yu and Marthie Grobler and Jingwen Zhang}, title = {{PASPORT:} {A} Secure and Private Location Proof Generation and Verification Framework}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {7}, number = {2}, pages = {293--307}, year = {2020}, url = {https://doi.org/10.1109/TCSS.2019.2960534}, doi = {10.1109/TCSS.2019.2960534}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcss/NosouhiSYGZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/SellakCG20, author = {Hamza Sellak and Mohan Baruwal Chhetri and Marthie Grobler}, editor = {Honghao Gao and Xinheng Wang and Muddesar Iqbal and Yuyu Yin and Jianwei Yin and Ning Gu}, title = {Towards a Trusted Collaborative Medical Decision-Making Platform}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing - 16th {EAI} International Conference, CollaborateCom 2020, Shanghai, China, October 16-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {350}, pages = {407--418}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-67540-0\_25}, doi = {10.1007/978-3-030-67540-0\_25}, timestamp = {Wed, 13 Jul 2022 15:43:13 +0200}, biburl = {https://dblp.org/rec/conf/colcom/SellakCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icann/WangRNGC20, author = {Shuo Wang and Carsten Rudolph and Surya Nepal and Marthie Grobler and Shangyu Chen}, editor = {Igor Farkas and Paolo Masulli and Stefan Wermter}, title = {{PART-GAN:} Privacy-Preserving Time-Series Sharing}, booktitle = {Artificial Neural Networks and Machine Learning - {ICANN} 2020 - 29th International Conference on Artificial Neural Networks, Bratislava, Slovakia, September 15-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12396}, pages = {578--593}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61609-0\_46}, doi = {10.1007/978-3-030-61609-0\_46}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icann/WangRNGC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/WangCCNRG20, author = {Shuo Wang and Tianle Chen and Shangyu Chen and Surya Nepal and Carsten Rudolph and Marthie Grobler}, title = {{OIAD:} One-for-all Image Anomaly Detection with Disentanglement Learning}, booktitle = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020, Glasgow, United Kingdom, July 19-24, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IJCNN48605.2020.9207434}, doi = {10.1109/IJCNN48605.2020.9207434}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/WangCCNRG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/SellakG20, author = {Hamza Sellak and Marthie Grobler}, editor = {John Grundy and Claire Le Goues and David Lo}, title = {mHealth4U: designing for health and wellbeing self-management}, booktitle = {35th {IEEE/ACM} International Conference on Automated Software Engineering Workshops, {ASE} Workshops 2020, Melbourne, Australia, September 21-25, 2020}, pages = {41--46}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3417113.3422179}, doi = {10.1145/3417113.3422179}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kbse/SellakG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ozchi/AlkhatibWBGW20, author = {Sami Alkhatib and Jenny Waycott and George Buchanan and Marthie Grobler and Shuo Wang}, editor = {Naseem Ahmadpour and Tuck Wah Leong and Bernd Ploderer and Callum Parker and Sarah Webber and Diego Mu{\~{n}}oz and Lian Loke and Martin Tomitsch}, title = {Privacy by Design in Aged Care Monitoring Devices? Well, Not Quite Yet!}, booktitle = {OzCHI '20: 32nd Australian Conference on Human-Computer-Interaction, Sydney, NSW, Australia, 2-4 December, 2020}, pages = {492--505}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3441000.3441049}, doi = {10.1145/3441000.3441049}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ozchi/AlkhatibWBGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SRG20, author = {Ahmad Salehi S. and Carsten Rudolph and Marthie Grobler}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {Attribute-Based Data Access Control for Multi-Authority System}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {1834--1841}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00251}, doi = {10.1109/TRUSTCOM50675.2020.00251}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SRG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/WangLCCNRG20, author = {Shuo Wang and Lingjuan Lyu and Tianle Chen and Shangyu Chen and Surya Nepal and Carsten Rudolph and Marthie Grobler}, editor = {Zhisheng Huang and Wouter Beek and Hua Wang and Rui Zhou and Yanchun Zhang}, title = {Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer}, booktitle = {Web Information Systems Engineering - {WISE} 2020 - 21st International Conference, Amsterdam, The Netherlands, October 20-24, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12343}, pages = {185--200}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62008-0\_13}, doi = {10.1007/978-3-030-62008-0\_13}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wise/WangLCCNRG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-02297, author = {Shuo Wang and Shangyu Chen and Tianle Chen and Surya Nepal and Carsten Rudolph and Marthie Grobler}, title = {Generating Semantic Adversarial Examples via Feature Manipulation}, journal = {CoRR}, volume = {abs/2001.02297}, year = {2020}, url = {http://arxiv.org/abs/2001.02297}, eprinttype = {arXiv}, eprint = {2001.02297}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-02297.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-03274, author = {Shuo Wang and Surya Nepal and Carsten Rudolph and Marthie Grobler and Shangyu Chen and Tianle Chen}, title = {Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models}, journal = {CoRR}, volume = {abs/2001.03274}, year = {2020}, url = {https://arxiv.org/abs/2001.03274}, eprinttype = {arXiv}, eprint = {2001.03274}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-03274.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-06640, author = {Shuo Wang and Tianle Chen and Shangyu Chen and Carsten Rudolph and Surya Nepal and Marthie Grobler}, title = {{OIAD:} One-for-all Image Anomaly Detection with Disentanglement Learning}, journal = {CoRR}, volume = {abs/2001.06640}, year = {2020}, url = {https://arxiv.org/abs/2001.06640}, eprinttype = {arXiv}, eprint = {2001.06640}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-06640.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-02007, author = {Shuo Wang and Tianle Chen and Surya Nepal and Carsten Rudolph and Marthie Grobler and Shangyu Chen}, title = {Defending Adversarial Attacks via Semantic Feature Manipulation}, journal = {CoRR}, volume = {abs/2002.02007}, year = {2020}, url = {https://arxiv.org/abs/2002.02007}, eprinttype = {arXiv}, eprint = {2002.02007}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-02007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-09701, author = {Shuo Wang and Surya Nepal and Marthie Grobler and Carsten Rudolph and Tianle Chen and Shangyu Chen}, title = {Adversarial Defense by Latent Style Transformations}, journal = {CoRR}, volume = {abs/2006.09701}, year = {2020}, url = {https://arxiv.org/abs/2006.09701}, eprinttype = {arXiv}, eprint = {2006.09701}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-09701.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TangMGMWW19, author = {Lihong Tang and Wanlun Ma and Marthie Grobler and Weizhi Meng and Yu Wang and Sheng Wen}, title = {Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media}, journal = {{IEEE} Access}, volume = {7}, pages = {75556--75567}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2921029}, doi = {10.1109/ACCESS.2019.2921029}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/TangMGMWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcps/WuTZWPNGX19, author = {Tingmin Wu and Lihong Tang and Rongjunchen Zhang and Sheng Wen and C{\'{e}}cile Paris and Surya Nepal and Marthie Grobler and Yang Xiang}, title = {Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps}, journal = {{ACM} Trans. Cyber Phys. Syst.}, volume = {3}, number = {4}, pages = {36:1--36:21}, year = {2019}, url = {https://doi.org/10.1145/3317699}, doi = {10.1145/3317699}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcps/WuTZWPNGX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SenarathGA19, author = {Awanthika Senarath and Marthie Grobler and Nalin Asanka Gamagedara Arachchilage}, title = {Will They Use It or Not? Investigating Software Developers' Intention to Follow Privacy Engineering Methodologies}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {4}, pages = {23:1--23:30}, year = {2019}, url = {https://doi.org/10.1145/3364224}, doi = {10.1145/3364224}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SenarathGA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/JeongGCR19, author = {Jongkil Jay Jeong and Marthie Grobler and M. A. P. Chamikara and Carsten Rudolph}, title = {Fuzzy Logic Application to Link National Culture and Cybersecurity Maturity}, booktitle = {5th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2019, Los Angeles, CA, USA, December 12-14, 2019}, pages = {330--337}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CIC48465.2019.00046}, doi = {10.1109/CIC48465.2019.00046}, timestamp = {Fri, 27 May 2022 15:04:14 +0200}, biburl = {https://dblp.org/rec/conf/coinco/JeongGCR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/CampGJPRW19, author = {L. Jean Camp and Marthie Grobler and Julian Jang{-}Jaccard and Christian Probst and Karen Renaud and Paul A. Watters}, editor = {Tung Bui}, title = {Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks}, booktitle = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019, Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019}, pages = {1--10}, publisher = {ScholarSpace}, year = {2019}, url = {https://hdl.handle.net/10125/59914}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/CampGJPRW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SenarathGA19, author = {Awanthika Senarath and Marthie Grobler and Nalin A. G. Arachchilage}, editor = {Tung Bui}, title = {A Model for System Developers to Measure the Privacy Risk of Data}, booktitle = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019, Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019}, pages = {1--10}, publisher = {ScholarSpace}, year = {2019}, url = {https://hdl.handle.net/10125/60048}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/SenarathGA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/SRG19, author = {Ahmad Salehi S. and Carsten Rudolph and Marthie Grobler}, editor = {Joe Betser and Carol J. Fung and Alex Clemm and J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and Shingo Ata}, title = {A Dynamic Cross-Domain Access Control Model for Collaborative Healthcare Application}, booktitle = {{IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2019, Washington, DC, USA, April 09-11, 2019}, pages = {643--648}, publisher = {{IFIP}}, year = {2019}, url = {https://ieeexplore.ieee.org/document/8717924}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/SRG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NosouhiYSG19, author = {Mohammad Reza Nosouhi and Shui Yu and Keshav Sood and Marthie Grobler}, title = {HSDC-Net: Secure Anonymous Messaging in Online Social Networks}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {350--357}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00054}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00054}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/NosouhiYSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShahrakiRG19, author = {Ahmad Salehi Shahraki and Carsten Rudolph and Marthie Grobler}, title = {A Dynamic Access Control Policy Model for Sharing of Healthcare Data in Multiple Domains}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {618--625}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00088}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00088}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShahrakiRG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/NosouhiYGXZ18, author = {Mohammad Reza Nosouhi and Shui Yu and Marthie Grobler and Yong Xiang and Zuqing Zhu}, title = {{SPARSE:} Privacy-Aware and Collusion Resistant Location Proof Generation and Verification}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi, United Arab Emirates, December 9-13, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/GLOCOM.2018.8647933}, doi = {10.1109/GLOCOM.2018.8647933}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/NosouhiYGXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-07070, author = {Tingmin Wu and Lihong Tang and Zhiyu Xu and Sheng Wen and C{\'{e}}cile Paris and Surya Nepal and Marthie Grobler and Yang Xiang}, title = {Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps}, journal = {CoRR}, volume = {abs/1805.07070}, year = {2018}, url = {http://arxiv.org/abs/1805.07070}, eprinttype = {arXiv}, eprint = {1805.07070}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-07070.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-09566, author = {Jongkil Kim and Jonathon M. Smereka and Calvin Cheung and Surya Nepal and Marthie Grobler}, title = {Security and Performance Considerations in {ROS} 2: {A} Balancing Act}, journal = {CoRR}, volume = {abs/1809.09566}, year = {2018}, url = {http://arxiv.org/abs/1809.09566}, eprinttype = {arXiv}, eprint = {1809.09566}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-09566.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-10884, author = {Awanthika Senarath and Marthie Grobler and Nalin Asanka Gamagedara Arachchilage}, title = {A model for system developers to measure the privacy risk of data}, journal = {CoRR}, volume = {abs/1809.10884}, year = {2018}, url = {http://arxiv.org/abs/1809.10884}, eprinttype = {arXiv}, eprint = {1809.10884}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-10884.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GcazaSGV17, author = {Noluxolo Gcaza and Rossouw von Solms and Marthie Grobler and Joey Jansen van Vuuren}, title = {A general morphological analysis: delineating a cyber-security culture}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {3}, pages = {259--278}, year = {2017}, url = {https://doi.org/10.1108/ICS-12-2015-0046}, doi = {10.1108/ICS-12-2015-0046}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GcazaSGV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/TangMWGXZ17, author = {Lihong Tang and Wanlun Ma and Sheng Wen and Marthie Grobler and Yang Xiang and Wanlei Zhou}, editor = {Athman Bouguettaya and Yunjun Gao and Andrey Klimenko and Lu Chen and Xiangliang Zhang and Fedor Dzerzhinskiy and Weijia Jia and Stanislav V. Klimenko and Qing Li}, title = {My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media}, booktitle = {Web Information Systems Engineering - {WISE} 2017 - 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10570}, pages = {528--539}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68786-5\_42}, doi = {10.1007/978-3-319-68786-5\_42}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wise/TangMWGXZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/SwartIG16, author = {Ignatius Swart and Barry Irwin and Marthie Grobler}, title = {Adaptation of the {JDL} Model for Multi-Sensor National Cyber Security Data Fusion}, journal = {Int. J. Cyber Warf. Terror.}, volume = {6}, number = {3}, pages = {17--30}, year = {2016}, url = {https://doi.org/10.4018/IJCWT.2016070102}, doi = {10.4018/IJCWT.2016070102}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/SwartIG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hcc/BothaEG16, author = {Johnny Botha and Mariki M. Eloff and Marthie Grobler}, editor = {David Kreps and Gordon Fletcher and Marie Griffiths}, title = {Ethical and Legal Issues Involved in the Pro-active Collection of Personal Information with the Aim of Reducing Online Disclosure}, booktitle = {Technology and Intimacy: Choice or Coercion - 12th {IFIP} {TC} 9 International Conference on Human Choice and Computers, {HCC12} 2016, Salford, UK, September 7-9, 2016, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {474}, pages = {72--85}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44805-3\_7}, doi = {10.1007/978-3-319-44805-3\_7}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hcc/BothaEG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/VeerasamyG15, author = {Namosha Veerasamy and Marthie Grobler}, title = {Logic Tester for the Classification of Cyberterrorism Attacks}, journal = {Int. J. Cyber Warf. Terror.}, volume = {5}, number = {1}, pages = {30--46}, year = {2015}, url = {https://doi.org/10.4018/IJCWT.2015010103}, doi = {10.4018/IJCWT.2015010103}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/VeerasamyG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hcc/GroblerS14, author = {Marthie Grobler and Ignus P. Swart}, editor = {Kai Kimppa and Diane Whitehouse and Tiina Kuusela and Jackie Phahlamohlaka}, title = {On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain}, booktitle = {{ICT} and Society - 11th {IFIP} {TC} 9 International Conference on Human Choice and Computers, {HCC11} 2014, Turku, Finland, July 30 - August 1, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {431}, pages = {239--254}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44208-1\_20}, doi = {10.1007/978-3-662-44208-1\_20}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hcc/GroblerS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hcc/VuurenGLP14, author = {Joey Jansen van Vuuren and Marthie Grobler and Louise Leenen and Jackie Phahlamohlaka}, editor = {Kai Kimppa and Diane Whitehouse and Tiina Kuusela and Jackie Phahlamohlaka}, title = {Proposed Model for a Cybersecurity Centre of Innovation for South Africa}, booktitle = {{ICT} and Society - 11th {IFIP} {TC} 9 International Conference on Human Choice and Computers, {HCC11} 2014, Turku, Finland, July 30 - August 1, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {431}, pages = {293--306}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44208-1\_24}, doi = {10.1007/978-3-662-44208-1\_24}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hcc/VuurenGLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SwartIG14, author = {Ignus P. Swart and Barry Irwin and Marthie Grobler}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Towards a platform to visualize the state of South Africa's information security}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950511}, doi = {10.1109/ISSA.2014.6950511}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/issa/SwartIG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saicsit/SwartIG14, author = {Ignus P. Swart and Barry Irwin and Marthie Grobler}, editor = {Carina de Villiers and Alta van der Merwe and Jacobus Philippus van Deventer and M. C. Matthee and Helene Gelderblom and Aurona Gerber}, title = {On the viability of pro-active automated {PII} breach detection: {A} South African case study}, booktitle = {Southern African Institute for Computer Scientist and Information Technologists Annual Conference 2014, {SAICSIT} '14, Centurion, South Africa, September 29 - October 1, 2014}, pages = {251}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664591.2664600}, doi = {10.1145/2664591.2664600}, timestamp = {Fri, 30 Dec 2022 11:13:31 +0100}, biburl = {https://dblp.org/rec/conf/saicsit/SwartIG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SwartGI13, author = {Ignus P. Swart and Marthie Grobler and Barry Irwin}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Visualization of a data leak}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641046}, doi = {10.1109/ISSA.2013.6641046}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/issa/SwartGI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/VuurenGZ12, author = {Joey Jansen van Vuuren and Marthie Grobler and Jannie Zaaiman}, title = {Cyber Security Awareness as Critical Driver to National Security}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {1}, pages = {27--38}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012010103}, doi = {10.4018/IJCWT.2012010103}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/VuurenGZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Grobler12, author = {Marthie Grobler}, title = {The Need for Digital Evidence Standardisation}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {2}, pages = {1--12}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012040101}, doi = {10.4018/JDCF.2012040101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Grobler12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MouhtaropoulosLG12, author = {Antonis Mouhtaropoulos and Chang{-}Tsun Li and Marthie Grobler}, editor = {Nasrullah Memon and Daniel Zeng}, title = {Proactive Digital Forensics: The Ever-Increasing Need for Standardization}, booktitle = {2012 European Intelligence and Security Informatics Conference, {EISIC} 2012, Odense, Denmark, August 22-24, 2012}, pages = {289}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/EISIC.2012.66}, doi = {10.1109/EISIC.2012.66}, timestamp = {Tue, 16 May 2023 16:54:39 +0200}, biburl = {https://dblp.org/rec/conf/eisic/MouhtaropoulosLG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hcc/GroblerVL12, author = {Marthie Grobler and Joey Jansen van Vuuren and Louise Leenen}, editor = {Magda David Hercheui and Diane Whitehouse and William J. McIver Jr. and Jackie Phahlamohlaka}, title = {Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward}, booktitle = {{ICT} Critical Infrastructures and Society - 10th {IFIP} {TC} 9 International Conference on Human Choice and Computers, {HCC10} 2012, Amsterdam, The Netherlands, September 27-28, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {386}, pages = {215--225}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33332-3\_20}, doi = {10.1007/978-3-642-33332-3\_20}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hcc/GroblerVL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/MouhtaropoulosGL11, author = {Antonis Mouhtaropoulos and Marthie Grobler and Chang{-}Tsun Li}, title = {Digital Forensic Readiness: An Insight into Governmental and Academic Initiatives}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {191--196}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.30}, doi = {10.1109/EISIC.2011.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/MouhtaropoulosGL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GroblerDNL11, author = {Marthie Grobler and Zama Dlamini and Sipho Ngobeni and Aubrey Labuschagne}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Towards a Cyber security aware rural community}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Grobler.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GroblerDNL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/Grobler10, author = {Marthie Grobler}, editor = {Nathan L. Clarke and Steven Furnell and Rossouw von Solms}, title = {Digital forensic standards: international progress}, booktitle = {South African Information Security Multi-Conference, {SAISMC} 2010, Port Elizabeth, South Africa, May 17-18, 2010. Proceedings}, pages = {261--271}, publisher = {University of Plymouth}, year = {2010}, url = {http://www.cscan.org/openaccess/?paperid=182}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/haisa/Grobler10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Grobler10, author = {Marthie Grobler}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Phishing for Fortune}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/01\_paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Grobler10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GroblerB10, author = {Marthie Grobler and Harri Bryk}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Common problems faced during the establishment of a {CSIRT}}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/17\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GroblerB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GroblerV10, author = {Marthie Grobler and Joey Jansen van Vuuren}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Broadband broadens scope for cyber crime in Africa}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/28\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GroblerV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GroblerS09, author = {Marthie Grobler and Basie von Solms}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {A Best Practice Approach to Live Forensic Acquisition}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {3--13}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/1\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GroblerS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/NgobeniG09, author = {Sipho Josia Ngobeni and Marthie Grobler}, editor = {Hein S. Venter and Marijke Coetzee and Les Labuschagne}, title = {Information Security Policies for Governmental Organisations, The Minimum Criteria}, booktitle = {Information Security South Africa Conference 2009, School of Tourism {\&} Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings {ISSA2009}}, pages = {455--466}, publisher = {ISSA, Pretoria, South Africa}, year = {2009}, url = {http://icsa.cs.up.ac.za/issa/2009/Proceedings/Research/50.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/NgobeniG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdfia/DlaminiOG09, author = {Innocentia Zamaswazi Dlamini and Martin Olivier and Marthie Grobler}, editor = {Nathan L. Clarke and Theodore Tryfonas}, title = {A Simulation of Logical Traffic Isolation Using Differentiated Services}, booktitle = {4th International Workshop on Digital Forensics and Incident Analysis, {WDFIA} 2009, Athens, Greece, June 25-26, 2009. Proceedings}, pages = {20--32}, publisher = {Plymouth University, {UK}}, year = {2009}, url = {http://www.cscan.org/openaccess/?paperid=71}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wdfia/DlaminiOG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.