Backdoor attacks against transfer learning with pre-trained deep learning models S Wang, S Nepal, C Rudolph, M Grobler, S Chen, T Chen IEEE Transactions on Services Computing 15 (3), 1526-1539, 2020 | 97 | 2020 |
Will they use it or not? Investigating software developers’ intention to follow privacy engineering methodologies A Senarath, M Grobler, NAG Arachchilage ACM Transactions on Privacy and Security (TOPS) 22 (4), 1-30, 2019 | 54 | 2019 |
User, usage and usability: Redefining human centric cyber security M Grobler, R Gaire, S Nepal Frontiers in big Data 4, 583723, 2021 | 48 | 2021 |
Blockchain for secure location verification MR Nosouhi, S Yu, W Zhou, M Grobler, H Keshtiar Journal of Parallel and Distributed Computing 136, 40-51, 2020 | 47 | 2020 |
Security and performance considerations in ros 2: A balancing act J Kim, JM Smereka, C Cheung, S Nepal, M Grobler arXiv preprint arXiv:1809.09566, 2018 | 47 | 2018 |
Digital forensic readiness: Are we there yet A Mouhtaropoulos, CT Li, M Grobler J. Int't Com. L. & Tech. 9, 173, 2014 | 43 | 2014 |
A general morphological analysis: delineating a cyber-security culture N Gcaza, R Von Solms, MM Grobler, JJ Van Vuuren Information & Computer Security 25 (3), 259-278, 2017 | 42 | 2017 |
Implementation of a cyber security policy in South Africa: Reflection on progress and the way forward M Grobler, JJ van Vuuren, L Leenen IFIP International Conference on Human Choice and Computers, 215-225, 2012 | 34 | 2012 |
A high-level comparison between the South African protection of personal information act and international data protection laws J Botha, MM Grobler, J Hahn, M Eloff ICMLG2017 5th International Conference on Management Leadership and …, 2017 | 33 | 2017 |
Digital forensic readiness: an insight into governmental and academic initiatives A Mouhtaropoulos, M Grobler, CT Li 2011 European Intelligence and Security Informatics Conference, 191-196, 2011 | 33 | 2011 |
Systematic literature review on cyber situational awareness visualizations L Jiang, A Jayatilaka, M Nasim, M Grobler, M Zahedi, MA Babar Ieee Access 10, 57525-57554, 2022 | 31 | 2022 |
Towards spoofing resistant next generation IoT networks MR Nosouhi, K Sood, M Grobler, R Doss IEEE Transactions on Information Forensics and Security 17, 1669-1683, 2022 | 30 | 2022 |
Pasport: A secure and private location proof generation and verification framework MR Nosouhi, K Sood, S Yu, M Grobler, J Zhang IEEE Transactions on Computational Social Systems 7 (2), 293-307, 2020 | 30 | 2020 |
Common challenges faced during the establishment of a CSIRT M Grobler, H Bryk 2010 Information Security for South Africa, 1-6, 2010 | 29 | 2010 |
Live forensic acquisition as alternative to traditional forensic processes M Lessing, B Von Solms IT Management and IT Forensics 2008, 2008 | 29 | 2008 |
Evaluating cyber security awareness in South Africa M Grobler, J Jansen Van Vuuren, J Zaaiman Proceedings of the 10th European Conference on Information Warfare and …, 2011 | 26 | 2011 |
Best practices show the way to Information Security Maturity MM Lessing ImproveIT 2008, 2008 | 25 | 2008 |
Global cyber trends a South African reality M Grobler, Z Dlamini IIMC International Information Management Corporation, 2012 | 24 | 2012 |
A dynamic access control policy model for sharing of healthcare data in multiple domains AS Shahraki, C Rudolph, M Grobler 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | 23 | 2019 |
Local differential privacy for federated learning MAP Chamikara, D Liu, S Camtepe, S Nepal, M Grobler, P Bertok, I Khalil arXiv preprint arXiv:2202.06053, 2022 | 22 | 2022 |