Dlamini, M.T., Venter, H.S., Eloff, J.H.P., & Eloff, M.M. (2020). Digital deception in cybersecurity: an information behaviour lens. In Proceedings of ISIC, the Information Behaviour Conference, Pretoria, South Africa, 28 September - 1 October, 2020. Information Research, 25(4), paper isic2018. Retrieved from http://InformationR.net/ir/25-4/isic2020/isic2018.html (Archived by the Internet Archive at https://bit.ly/3qRXNIr) https://doi.org/10.47989/irisic2018
2020
A heuristics for HTTP traffic identification in measuring user dissimilarity
@article{Ikuesan_2020,
doi = {10.1007/s42454-020-00010-2},
url = {https://doi.org/10.1007%2Fs42454-020-00010-2},
year = 2020,
month = {jun},
publisher = {Springer Science and Business Media {LLC}},
volume = {2},
number = {1-4},
pages = {17--28},
author = {Adeyemi R. Ikuesan and Mazleena Salleh and Hein S. Venter and Shukor Abd Razak and Steven M. Furnell},
title = {A heuristics for {HTTP} traffic identification in measuring user dissimilarity},
journal = {Human-Intelligent Systems Integration}
}
2020
A study on problems of behaviour-based user attribution in computer forensic investigation
@article{Akotoye2020,title = {A study on problems of behaviour-based user attribution in computer forensic investigation},journal = {European Conference on Information Warfare and Security, ECCWS},year = {2020},volume = {2020-June},pages = {458-465},author = {Akotoye, F.X.K. and Adeyemi, R.I. and Venter, H.S.}}
2020
A Conceptual Model for Consent Management in South African e-Health Systems for Privacy Preservation
@inproceedings{Mlotshwa_2020, doi = {10.1145/3415088.3415097}, url = {https://doi.org/10.1145%2F3415088.3415097}, year = 2020, month = {sep}, publisher = {{ACM}}, author = {Likhwa Lothar Mlotshwa and Sheunesu M. Makura and Nickson M. Karie and Victor R. Kebande}, title = {Opportunistic security architecture for osmotic computing paradigm in dynamic {IoT}-Edge{\textquotesingle}s resource diffusion}, booktitle = {Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications}}