@article{Ikuesan2019,title = {Towards a digital policing in developing nations: The nigerian context},journal = {International Journal of Innovative Technology and Exploring Engineering},year = {2019},volume = {8},number = {7C2},pages = {205-213},author = {Ismaila, I. and Legbo, V.Y. and Ikuesan, A.R. and Imavah, S.A. and Mohammad, A.B. and Abduldayan, F.J. and Baba, M.}}
2019
A class project to prepare software engineering students for their capstone projects
@article{Baror2019,title = {A class project to prepare software engineering students for their capstone projects},journal = {ACM International Conference Proceeding Series},year = {2019},pages = {66-78},author = {Posthuma, J. and Pieterse, V. and Baror, S.}}
2019
Data poisoning: Achilles heel of cyber threat intelligence systems
@article{Dlamini2019,title = {Data poisoning: Achilles heel of cyber threat intelligence systems},journal = {14th International Conference on Cyber Warfare and Security, ICCWS 2019},year = {2019},pages = {221-230},author = {Mahlangu, T. and January, S. and Mashiane, T. and Dlamini, M. and Ngobeni, S. and Ruxwana, N.}}
2019
The Current State of Electronic Consent Systems in e-Health for Privacy Preservation
@incollection{Zazaza_2019,
doi = {10.1007/978-3-030-11407-7_6},
url = {https://doi.org/10.1007%2F978-3-030-11407-7_6},
year = 2019,
publisher = {Springer International Publishing},
pages = {76--88},
author = {Lelethu Zazaza and H. S. Venter and George Sibiya},
title = {The Current State of Electronic Consent Systems in e-Health for Privacy Preservation},
booktitle = {Communications in Computer and Information Science}
}
2019
Classifying the Authenticity of Evaluated Smartphone Data