@article{Adeyemi2013,title = {A Digital Forensic Investigation Model for Insider Misuse},journal = {Advances in Intelligent Systems and Computing},year = {2013},volume = {225},number = {1},pages = {293-305},author = {Adeyemi, I.R. and Razak, S.A. and Zainal, A. and Azhan, N.A.N.}}
2013
Comparative Analysis of Gravitational Search Algorithm and K-Means Clustering Algorithm for Intrusion Detection System
@article{Adeyemi2013,title = {Comparative Analysis of Gravitational Search Algorithm and K-Means Clustering Algorithm for Intrusion Detection System},journal = {Advances in Intelligent Systems and Computing},year = {2013},volume = {225},number = {1},pages = {307-316},author = {Shahri, B.M.A. and Zadeh, S.K. and Adeyemi, I.R. and Zainal, A.}}
2013
On the completeness of reconstructed data for database forensics
Adedayo, O.M., Olivier, M.S.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
@article{Olivier2013,title = {On the completeness of reconstructed data for database forensics},journal = {Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST},year = {2013},volume = {114 LNICST},pages = {220-238},author = {Adedayo, O.M. and Olivier, M.S.}}
2013
Preparing software engineering students for industry
N/A
@article{pietersepreparing, title= {Preparing software engineering students for industry}, author= {Pieterse, Vreda and Solms, Fritz and Omeleze, Stacey}}
2012
2012 Information Security for South Africa - Proceedings of the ISSA 2012 Conference: Introduction
@article{Venter2012,title = {2012 Information Security for South Africa - Proceedings of the ISSA 2012 Conference: Introduction},journal = {2012 Information Security for South Africa - Proceedings of the ISSA 2012 Conference},year = {2012},author = {Venter, H. and Loock, M. and Coetzee, M.}}