@article{Dlamini2019,title = {Data poisoning: Achilles heel of cyber threat intelligence systems},journal = {14th International Conference on Cyber Warfare and Security, ICCWS 2019},year = {2019},pages = {221-230},author = {Mahlangu, T. and January, S. and Mashiane, T. and Dlamini, M. and Ngobeni, S. and Ruxwana, N.}}
2019
The Current State of Electronic Consent Systems in e-Health for Privacy Preservation
@incollection{Zazaza_2019,
doi = {10.1007/978-3-030-11407-7_6},
url = {https://doi.org/10.1007%2F978-3-030-11407-7_6},
year = 2019,
publisher = {Springer International Publishing},
pages = {76--88},
author = {Lelethu Zazaza and H. S. Venter and George Sibiya},
title = {The Current State of Electronic Consent Systems in e-Health for Privacy Preservation},
booktitle = {Communications in Computer and Information Science}
}
2019
Classifying the Authenticity of Evaluated Smartphone Data
@article{Kebande_2017,
doi = {10.1080/00450618.2016.1267797},
url = {https://doi.org/10.1080%2F00450618.2016.1267797},
year = 2017,
month = {jan},
publisher = {Informa {UK} Limited},
pages = {1--40},
author = {Victor R. Kebande and H. S. Venter},
title = {Novel digital forensic readiness technique in the cloud environment},
journal = {Australian Journal of Forensic Sciences}
}