@article{Adeyemi_2016,doi = {10.3389/fict.2016.00008},url = {https://doi.org/10.3389%2Ffict.2016.00008},year = 2016,month = {may},publisher = {Frontiers Media {SA}},volume = {3},author = {Ikuesan Richard Adeyemi and Shukor Abd Razak and Mazleena Salleh},title = {Understanding Online Behavior: Exploring the Probability of Online Personality Trait Using Supervised Machine-Learning Approach},journal = {Frontiers in {ICT}}}
2016
A Mobile Forensic Readiness Model aimed at Minimizing Cyber Bullying
@incollection{Gaithuru_2016,doi = {10.1007/978-3-319-48517-1_16},url = {https://doi.org/10.1007%2F978-3-319-48517-1_16},year = 2016,month = {oct},publisher = {Springer International Publishing},pages = {175--187},author = {Juliet N. Gaithuru and Mazleena Salleh and Ismail Mohamad and Ikuesan R. Adeyemi},title = {{NTRU} Binary Polynomials Parameters Selection for Reduction of Decryption Failure},booktitle = {Advances in Intelligent Systems and Computing}}
2016
Industrial espionage: Corporate data continues to leak
@article{Dlamini2016,title = {Industrial espionage: Corporate data continues to leak},journal = {Proceedings of the 11th International Conference on Cyber Warfare and Security, ICCWS 2016},year = {2016},pages = {90-97},author = {Dlamini, M. and Eloff, J. and Eloff, M.}}
2016
Reference Architecture for Android Applications to Support the
Detection of Manipulated Evidence
SAIEE Africa Research Journal
@article{andrtime2, author= {Heloise Pieterse and Martin S Olivier and Renier van
Heerden}, title= {Reference Architecture for {Android} Applications to Support the
Detection of Manipulated Evidence}, month= {jun}, year= {2016}, pages= {106--117}, journal= {SAIEE Africa Research Journal}, url= {http://az817975.vo.msecnd.net/wm-418498-cmsimages/ARJJune2016-44-554.pdf}}