


default search action
Marthie Grobler
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c43]Yue Huang, Marthie Grobler, Lauren S. Ferro
, Georgia Psaroulis, Sanchari Das
, Jing Wei, Helge Janicke
:
Systemization of Knowledge (SoK): Goals, Coverage, and Evaluation in Cybersecurity and Privacy Games. CHI 2025: 869:1-869:27 - 2024
- [j33]Monica T. Whitty
, Nour Moustafa, Marthie Grobler
:
Cybersecurity when working from home during COVID-19: considering the human factors. J. Cybersecur. 10(1) (2024) - [j32]Monica T. Whitty
, Christopher Ruddy, David A. Keatley
, Marcus A. Butavicius, Marthie Grobler
:
The prince of insiders: a multiple pathway approach to understanding IP theft insider attacks. Inf. Comput. Secur. 32(4): 509-522 (2024) - [j31]Malyun Muhudin Hilowle, William Yeoh, Marthie Grobler, Graeme Pye, Frank Jiang:
Improving National Digital Identity Systems Usage: Human-Centric Cybersecurity Survey. J. Comput. Inf. Syst. 64(6): 820-834 (2024) - [j30]Lihong Tang
, Xiao Chen
, Sheng Wen
, Li Li
, Marthie Grobler
, Yang Xiang
:
Demystifying the Evolution of Android Malware Variants. IEEE Trans. Dependable Secur. Comput. 21(4): 3324-3341 (2024) - [j29]Shuo Wang
, Shangyu Chen, Tianle Chen, Surya Nepal
, Carsten Rudolph
, Marthie Grobler
:
Generating Semantic Adversarial Examples via Feature Manipulation in Latent Space. IEEE Trans. Neural Networks Learn. Syst. 35(12): 17070-17084 (2024) - [i15]Van Nguyen, Tingmin Wu, Xingliang Yuan, Marthie Grobler, Surya Nepal, Carsten Rudolph:
A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection. CoRR abs/2402.17092 (2024) - [i14]Van Nguyen, Xingliang Yuan, Tingmin Wu, Surya Nepal, Marthie Grobler, Carsten Rudolph:
Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far Have We Gone? CoRR abs/2404.05964 (2024) - 2023
- [j28]Ahmad Salehi S.
, Runchao Han, Carsten Rudolph, Marthie Grobler
:
DACP: Enforcing a dynamic access control policy in cross-domain environments. Comput. Networks 237: 110049 (2023) - [j27]Malyun Muhudin Hilowle, William Yeoh
, Marthie Grobler, Graeme Pye, Frank Jiang:
Users' Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review. J. Comput. Inf. Syst. 63(5): 1264-1279 (2023) - [j26]Ahmad Salehi Shahraki
, Hagen Lauer
, Marthie Grobler
, Amin Sakzad
, Carsten Rudolph
:
Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks. Sensors 23(24): 9856 (2023) - [j25]Mohammad Reza Nosouhi
, Shui Yu
, Keshav Sood
, Marthie Grobler
, Raja Jurdak
, Ali Dorri
, Shigen Shen
:
UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies. IEEE Trans. Dependable Secur. Comput. 20(1): 242-255 (2023) - [j24]Lihong Tang
, Tingmin Wu, Xiao Chen
, Sheng Wen
, Li Li
, Xin Xia
, Marthie Grobler
, Yang Xiang
:
How Does Visualisation Help App Practitioners Analyse Android Apps? IEEE Trans. Dependable Secur. Comput. 20(3): 2238-2255 (2023) - [j23]Yanjun Zhang
, Guangdong Bai
, Xue Li
, Surya Nepal
, Marthie Grobler
, Chen Chen
, Ryan K. L. Ko
:
Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks. IEEE Trans. Dependable Secur. Comput. 20(4): 3341-3357 (2023) - [c42]Mohan Baruwal Chhetri
, Xiao Liu, Marthie Grobler
, Thuong N. Hoang, Karen Renaud
, Chetan Arora:
Report on the 4th Workshop on Human-Centric Software Engineering & Cyber Security (HCSE&CS 2023). ASEW 2023: 1-2 - [c41]Tooba Aamir, Mohan Baruwal Chhetri, M. A. P. Chamikara, Marthie Grobler:
Government Mobile Apps: Analysing Citizen Feedback via App Reviews. ASE 2023: 1858-1863 - 2022
- [j22]Liuyue Jiang
, Asangi Jayatilaka
, Mehwish Nasim
, Marthie Grobler
, Mansooreh Zahedi
, Muhammad Ali Babar
:
Systematic Literature Review on Cyber Situational Awareness Visualizations. IEEE Access 10: 57525-57554 (2022) - [j21]Surya Nepal
, Ryan K. L. Ko
, Marthie Grobler
, L. Jean Camp:
Editorial: Human-Centric Security and Privacy. Frontiers Big Data 5: 848058 (2022) - [j20]Mohan Baruwal Chhetri
, Xiao Liu, Marthie Grobler
, Thuong N. Hoang
, Karen Renaud
, Jennifer McIntosh:
Report on the 2nd Workshop on Human Centric Software Engineering & Cyber Security (HCSE&CS 2021). ACM SIGSOFT Softw. Eng. Notes 47(2): 12-14 (2022) - [j19]Shuo Wang
, Surya Nepal
, Alsharif Abuadbba, Carsten Rudolph
, Marthie Grobler
:
Adversarial Detection by Latent Style Transformations. IEEE Trans. Inf. Forensics Secur. 17: 1099-1114 (2022) - [j18]Mohammad Reza Nosouhi
, Keshav Sood
, Marthie Grobler
, Robin Doss
:
Towards Spoofing Resistant Next Generation IoT Networks. IEEE Trans. Inf. Forensics Secur. 17: 1669-1683 (2022) - [j17]Shuo Wang
, Surya Nepal
, Kristen Moore
, Marthie Grobler
, Carsten Rudolph
, Alsharif Abuadbba:
OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning. IEEE Trans. Parallel Distributed Syst. 33(12): 3460-3477 (2022) - [j16]Shuo Wang
, Surya Nepal
, Carsten Rudolph
, Marthie Grobler
, Shangyu Chen, Tianle Chen:
Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models. IEEE Trans. Serv. Comput. 15(3): 1526-1539 (2022) - [j15]Shuo Wang
, Surya Nepal
, Carsten Rudolph
, Marthie Grobler
, Shangyu Chen, Tianle Chen, Zike An:
Defending Adversarial Attacks via Semantic Feature Manipulation. IEEE Trans. Serv. Comput. 15(6): 3184-3197 (2022) - [c40]Mahawaga Arachchige Pathum Chamikara
, Dongxi Liu, Seyit Camtepe
, Surya Nepal
, Marthie Grobler
, Peter Bertók, Ibrahim Khalil:
Local Differential Privacy for Federated Learning. ESORICS (1) 2022: 195-216 - [c39]Jongkil Jeong, Marthie Grobler, M. A. P. Chamikara:
Simplifying Cyber Security Maturity Models through National Culture: A Fuzzy Logic Approach. HICSS 2022: 1-10 - [c38]Hamza Sellak, Mohan Baruwal Chhetri, Zijin Huang, Marthie Grobler:
Smart Contract-based Consensus Building for Collaborative Medical Decision-Making. HICSS 2022: 1-10 - [c37]Shuo Wang, Jinyuan Qin, Carsten Rudolph, Surya Nepal, Marthie Grobler:
R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy. IJCNN 2022: 1-9 - [c36]Adam Tonkin
, William Kosasih
, Marthie Grobler
, Mehwish Nasim
:
Simulating cyber security management: A gamified approach to executive decision making. ASE 2022: 222:1-222:8 - [c35]Malyun Muhudin Hilowle
, William Yeoh
, Marthie Grobler
, Graeme Pye
, Frank Jiang:
Towards Improving the Adoption and Usage of National Digital Identity Systems. ASE 2022: 223:1-223:6 - [i13]M. A. P. Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bertók, Ibrahim Khalil:
Local Differential Privacy for Federated Learning in Industrial Settings. CoRR abs/2202.06053 (2022) - [i12]Reena Zelenkova, Jack Swallow, M. A. P. Chamikara, Dongxi Liu, Mohan Baruwal Chhetri, Seyit Camtepe, Marthie Grobler, Mahathir Almashor:
Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches. CoRR abs/2202.10320 (2022) - 2021
- [j14]Chamila Wijayarathna
, Marthie Grobler
, Nalin A. G. Arachchilage:
Software developers need help too! Developing a methodology to analyse cognitive dimension-based feedback on usability. Behav. Inf. Technol. 40(6): 506-527 (2021) - [j13]Marthie Grobler
, Raj Gaire, Surya Nepal
:
User, Usage and Usability: Redefining Human Centric Cyber Security. Frontiers Big Data 4: 583723 (2021) - [j12]Sami Alkhatib, Ryan Kelly
, Jenny Waycott, George Buchanan, Marthie Grobler
, Shuo Wang:
"Who Wants to Know all this Stuff?!": Understanding Older Adults' Privacy Concerns in Aged Care Monitoring Devices. Interact. Comput. 33(5): 481-498 (2021) - [j11]Marthie Grobler
, M. A. P. Chamikara
, Jacob Abbott
, Jongkil Jay Jeong
, Surya Nepal
, Cécile Paris:
The importance of social identity on password formulations. Pers. Ubiquitous Comput. 25(5): 813-827 (2021) - [c34]Zichan Ruan, Shuiqiao Yang, Lei Pan, Xingjun Ma, Wei Luo
, Marthie Grobler:
Microwave Link Failures Prediction via LSTM-based Feature Fusion Network. IJCNN 2021: 1-8 - [c33]Hamza Sellak, Mohan Baruwal Chhetri
, Marthie Grobler
, Kristen Moore:
ACSIMA: A Cyber Security Index for Mobile Health Apps. ASE Workshops 2021: 145-152 - [i11]Shuo Wang, Surya Nepal, Kristen Moore, Marthie Grobler, Carsten Rudolph, Alsharif Abuadbba:
OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning. CoRR abs/2105.00602 (2021) - [i10]Shuo Wang, Lingjuan Lyu, Surya Nepal, Carsten Rudolph, Marthie Grobler, Kristen Moore:
Robust Training Using Natural Transformation. CoRR abs/2105.04070 (2021) - [i9]Liuyue Jiang, Asangi Jayatilaka, Mehwish Nasim, Marthie Grobler, Mansooreh Zahedi, Muhammad Ali Babar:
Systematic Literature Review on Cyber Situational Awareness Visualizations. CoRR abs/2112.10354 (2021) - 2020
- [j10]Mohammad Reza Nosouhi
, Shui Yu
, Wanlei Zhou
, Marthie Grobler
, Habiba Keshtiar:
Blockchain for secure location verification. J. Parallel Distributed Comput. 136: 40-51 (2020) - [j9]Mohammad Reza Nosouhi
, Keshav Sood
, Shui Yu
, Marthie Grobler
, Jingwen Zhang:
PASPORT: A Secure and Private Location Proof Generation and Verification Framework. IEEE Trans. Comput. Soc. Syst. 7(2): 293-307 (2020) - [c32]Hamza Sellak
, Mohan Baruwal Chhetri
, Marthie Grobler
:
Towards a Trusted Collaborative Medical Decision-Making Platform. CollaborateCom (2) 2020: 407-418 - [c31]Shuo Wang, Carsten Rudolph, Surya Nepal, Marthie Grobler, Shangyu Chen:
PART-GAN: Privacy-Preserving Time-Series Sharing. ICANN (1) 2020: 578-593 - [c30]Shuo Wang, Tianle Chen, Shangyu Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning. IJCNN 2020: 1-8 - [c29]Hamza Sellak
, Marthie Grobler
:
mHealth4U: designing for health and wellbeing self-management. ASE Workshops 2020: 41-46 - [c28]Sami Alkhatib, Jenny Waycott, George Buchanan, Marthie Grobler, Shuo Wang:
Privacy by Design in Aged Care Monitoring Devices? Well, Not Quite Yet! OZCHI 2020: 492-505 - [c27]Ahmad Salehi S., Carsten Rudolph, Marthie Grobler
:
Attribute-Based Data Access Control for Multi-Authority System. TrustCom 2020: 1834-1841 - [c26]Shuo Wang, Lingjuan Lyu, Tianle Chen, Shangyu Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer. WISE (2) 2020: 185-200 - [i8]Shuo Wang, Shangyu Chen, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
Generating Semantic Adversarial Examples via Feature Manipulation. CoRR abs/2001.02297 (2020) - [i7]Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen:
Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models. CoRR abs/2001.03274 (2020) - [i6]Shuo Wang, Tianle Chen, Shangyu Chen, Carsten Rudolph, Surya Nepal, Marthie Grobler:
OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning. CoRR abs/2001.06640 (2020) - [i5]Shuo Wang, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen:
Defending Adversarial Attacks via Semantic Feature Manipulation. CoRR abs/2002.02007 (2020) - [i4]Shuo Wang, Surya Nepal, Marthie Grobler, Carsten Rudolph, Tianle Chen, Shangyu Chen:
Adversarial Defense by Latent Style Transformations. CoRR abs/2006.09701 (2020)
2010 – 2019
- 2019
- [j8]Lihong Tang, Wanlun Ma, Marthie Grobler
, Weizhi Meng
, Yu Wang
, Sheng Wen:
Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media. IEEE Access 7: 75556-75567 (2019) - [j7]Tingmin Wu
, Lihong Tang, Rongjunchen Zhang, Sheng Wen, Cécile Paris, Surya Nepal
, Marthie Grobler
, Yang Xiang:
Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps. ACM Trans. Cyber Phys. Syst. 3(4): 36:1-36:21 (2019) - [j6]Awanthika Senarath, Marthie Grobler
, Nalin Asanka Gamagedara Arachchilage:
Will They Use It or Not? Investigating Software Developers' Intention to Follow Privacy Engineering Methodologies. ACM Trans. Priv. Secur. 22(4): 23:1-23:30 (2019) - [c25]Jongkil Jay Jeong
, Marthie Grobler, M. A. P. Chamikara
, Carsten Rudolph
:
Fuzzy Logic Application to Link National Culture and Cybersecurity Maturity. CIC 2019: 330-337 - [c24]L. Jean Camp, Marthie Grobler, Julian Jang-Jaccard, Christian Probst, Karen Renaud, Paul A. Watters:
Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks. HICSS 2019: 1-10 - [c23]Awanthika Senarath, Marthie Grobler, Nalin A. G. Arachchilage:
A Model for System Developers to Measure the Privacy Risk of Data. HICSS 2019: 1-10 - [c22]Ahmad Salehi S., Carsten Rudolph, Marthie Grobler:
A Dynamic Cross-Domain Access Control Model for Collaborative Healthcare Application. IM 2019: 643-648 - [c21]Mohammad Reza Nosouhi
, Shui Yu
, Keshav Sood
, Marthie Grobler
:
HSDC-Net: Secure Anonymous Messaging in Online Social Networks. TrustCom/BigDataSE 2019: 350-357 - [c20]Ahmad Salehi Shahraki, Carsten Rudolph
, Marthie Grobler
:
A Dynamic Access Control Policy Model for Sharing of Healthcare Data in Multiple Domains. TrustCom/BigDataSE 2019: 618-625 - 2018
- [c19]Mohammad Reza Nosouhi
, Shui Yu
, Marthie Grobler
, Yong Xiang, Zuqing Zhu:
SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification. GLOBECOM 2018: 1-6 - [i3]Tingmin Wu, Lihong Tang, Zhiyu Xu, Sheng Wen, Cécile Paris, Surya Nepal, Marthie Grobler, Yang Xiang:
Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps. CoRR abs/1805.07070 (2018) - [i2]Jongkil Kim, Jonathon M. Smereka, Calvin Cheung
, Surya Nepal, Marthie Grobler:
Security and Performance Considerations in ROS 2: A Balancing Act. CoRR abs/1809.09566 (2018) - [i1]Awanthika Senarath, Marthie Grobler, Nalin Asanka Gamagedara Arachchilage:
A model for system developers to measure the privacy risk of data. CoRR abs/1809.10884 (2018) - 2017
- [j5]Noluxolo Gcaza, Rossouw von Solms, Marthie Grobler
, Joey Jansen van Vuuren:
A general morphological analysis: delineating a cyber-security culture. Inf. Comput. Secur. 25(3): 259-278 (2017) - [c18]Lihong Tang, Wanlun Ma, Sheng Wen
, Marthie Grobler
, Yang Xiang, Wanlei Zhou
:
My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media. WISE (2) 2017: 528-539 - 2016
- [j4]Ignatius Swart, Barry Irwin
, Marthie Grobler
:
Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion. Int. J. Cyber Warf. Terror. 6(3): 17-30 (2016) - [c17]Johnny Botha
, Mariki M. Eloff, Marthie Grobler
:
Ethical and Legal Issues Involved in the Pro-active Collection of Personal Information with the Aim of Reducing Online Disclosure. HCC 2016: 72-85 - 2015
- [j3]Namosha Veerasamy, Marthie Grobler:
Logic Tester for the Classification of Cyberterrorism Attacks. Int. J. Cyber Warf. Terror. 5(1): 30-46 (2015) - 2014
- [c16]Marthie Grobler
, Ignus P. Swart:
On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain. HCC 2014: 239-254 - [c15]Joey Jansen van Vuuren, Marthie Grobler
, Louise Leenen, Jackie Phahlamohlaka:
Proposed Model for a Cybersecurity Centre of Innovation for South Africa. HCC 2014: 293-306 - [c14]Ignus P. Swart, Barry Irwin
, Marthie Grobler
:
Towards a platform to visualize the state of South Africa's information security. ISSA 2014: 1-8 - [c13]Ignus P. Swart, Barry Irwin
, Marthie Grobler
:
On the viability of pro-active automated PII breach detection: A South African case study. SAICSIT 2014: 251 - 2013
- [c12]Ignus P. Swart, Marthie Grobler
, Barry Irwin
:
Visualization of a data leak. ISSA 2013: 1-8 - 2012
- [j2]Joey Jansen van Vuuren, Marthie Grobler
, Jannie Zaaiman:
Cyber Security Awareness as Critical Driver to National Security. Int. J. Cyber Warf. Terror. 2(1): 27-38 (2012) - [j1]Marthie Grobler
:
The Need for Digital Evidence Standardisation. Int. J. Digit. Crime Forensics 4(2): 1-12 (2012) - [c11]Antonis Mouhtaropoulos, Chang-Tsun Li
, Marthie Grobler
:
Proactive Digital Forensics: The Ever-Increasing Need for Standardization. EISIC 2012: 289 - [c10]Marthie Grobler
, Joey Jansen van Vuuren, Louise Leenen:
Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward. HCC 2012: 215-225 - 2011
- [c9]Antonis Mouhtaropoulos, Marthie Grobler
, Chang-Tsun Li
:
Digital Forensic Readiness: An Insight into Governmental and Academic Initiatives. EISIC 2011: 191-196 - [c8]Marthie Grobler, Zama Dlamini, Sipho Ngobeni, Aubrey Labuschagne:
Towards a Cyber security aware rural community. ISSA 2011 - 2010
- [c7]Marthie Grobler:
Digital forensic standards: international progress. SAISMC 2010: 261-271 - [c6]Marthie Grobler:
Phishing for Fortune. ISSA 2010 - [c5]Marthie Grobler, Harri Bryk:
Common problems faced during the establishment of a CSIRT. ISSA 2010 - [c4]Marthie Grobler, Joey Jansen van Vuuren:
Broadband broadens scope for cyber crime in Africa. ISSA 2010
2000 – 2009
- 2009
- [c3]Marthie Grobler, Basie von Solms:
A Best Practice Approach to Live Forensic Acquisition. ISSA 2009: 3-13 - [c2]Sipho Josia Ngobeni, Marthie Grobler:
Information Security Policies for Governmental Organisations, The Minimum Criteria. ISSA 2009: 455-466 - [c1]Innocentia Zamaswazi Dlamini, Martin Olivier, Marthie Grobler:
A Simulation of Logical Traffic Isolation Using Differentiated Services. WDFIA 2009: 20-32
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-03 01:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint