@article{Venter2010,title = {Social engineering attack detection model: SEADM},journal = {Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010},year = {2010},author = {Bezuidenhout, M. and Mouton, F. and Venter, H.S.}}
2010
Detecting XML data irregularities by means of lexical analysis and parsing
Kotze, D., Olivier, M.
9th European Conference on Information Warfare and Security 2010, ECIW 2010
@article { olivier2010,title = {Detecting XML data irregularities by means of lexical analysis and parsing},journal = {9th European Conference on Information Warfare and Security 2010, ECIW 2010},year = {2010},pages = {151-159},author = {Kotze, D. and Olivier, M.}}
@article { olivier2010,title = {On the use of economic price theory to find the optimum levels of privacy and information utility in non-perturbative microdata anonymisation},journal = {Data and Knowledge Engineering},year = {2010},volume = {69},number = {5},pages = {399-423},author = {Zielinski, M.P. and Olivier, M.S.}}
2010
Sequenced release of privacy-accurate information in a forensic investigation