@article{Dlamini2017,title = {Application of artificial intelligence for detecting derived viruses},journal = {European Conference on Information Warfare and Security, ECCWS},year = {2017},pages = {647-655},author = {Asiru, O. and Dlamini, M. and Blackledge, J.}}
2017
A Text Steganographic System Based on Word Length Entropy Rate
@article{Akotoye_2017,
doi = {10.3991/ijes.v5i3.7521},
url = {https://doi.org/10.3991%2Fijes.v5i3.7521},
year = 2017,
month = {oct},
publisher = {International Association of Online Engineering ({IAOE})},
volume = {5},
number = {3},
pages = {71},
author = {Francis Xavier Kofi Akotoye},
title = {A Text Steganographic System Based on Word Length Entropy Rate},
journal = {International Journal of Recent Contributions from Engineering, Science {\&} {IT} ({iJES})}
}
2017
Enforcing privacy by with holding private information
@article{Olivier2017,title = {Enforcing privacy by with holding private information},journal = {IFIP Advances in Information and Communication Technology},year = {2017},volume = {47},pages = {421-430},author = {Lategan, F. and Olivier, M.S.}}
@article{Olivier2017,title = {Forensic attribution in NoSQL databases},journal = {2017 Information Security for South Africa - Proceedings of the 2017 ISSA Conference},year = {2017},volume = {2018-January},pages = {74-82},author = {Hauger, W.K. and Olivier, M.S.}}