Information security: The moving target MT Dlamini, JHP Eloff, MM Eloff Computers & security 28 (3-4), 189-198, 2009 | 263 | 2009 |
Internet of people, things and services-the convergence of security, trust and privacy JHP Eloff, MM Eloff, MT Dlamini, MP Zielinski | 43 | 2009 |
Internet of things: emerging and future scenarios from an information security perspective MT Dlamini, MM Eloff, JHP Eloff Southern Africa Telecommunication Networks and Applications Conference, 2009 | 37 | 2009 |
Securing cloud computing’s blind-spots using strong and risk-based MFA MT Dlamini, MM Eloff, HS JHP Eloff, JM K Chetty | 13 | 2016 |
Internet of people, things and services–the convergence of security, trust and privacy MT Dlamini, MM Eloff, JHP Eloff The Proceeding of 3rd Annual CompanionAble Consortium Workshop-IoPTs …, 2009 | 12 | 2009 |
Application of Artificial Intelligence for Detecting Computing Derived Viruses J Blackledge, O Asiru, M Dlamini Technological University Dublin, 2017 | 10 | 2017 |
Chaos-based encryption keys and neural key-store for cloud-hosted data confidentiality NN Mosola, MT Dlamini, J Blackledge, JHP Eloff, HS Venter Technological University Dublin, 2017 | 10 | 2017 |
Authentication in the Cloud: A risk-based approach MT Dlamini, HS Venter, JHP Eloff, Y Mitha Southern Africa Telecommunication Networks and Applications Conference …, 2012 | 9 | 2012 |
Data poisoning: Achilles heel of cyber threat intelligence systems T Mahlangu, S January, T Mashiane, M Dlamini, S Ngobeni, N Ruxwana Proceedings of the ICCWS 2019 14th International Conference on Cyber Warfare …, 2019 | 6 | 2019 |
Requirements for Preparing the Cloud to Become Ready for Digital Forensic Investigation M Dlamini, H Venter, J Eloff, M Eloff Proceedings of the 13th European Conference on Cyber warefare and Security …, 2014 | 6 | 2014 |
CBAC4C: conflict‐based VM isolation control for cloud computing MT Dlamini, JHP Eloff, HS Venter, MM Eloff International Transactions in Operational Research, 2021 | 5 | 2021 |
Security of Cloud Computing: Seeing Through the Fog MT Dlamini, HS Venter, JHP Eloff, MM Eloff computing 2, 3, 2012 | 5 | 2012 |
The economics of information security MTPJHPE Dlamini University of Pretoria, 2010 | 5 | 2010 |
Digital deception in cybersecurity: an information behaviour lens MME MT Dlamini, HS Venter, JHP Eloff Information Research 25 (4), 2020 | 3* | 2020 |
A Conflict-aware Placement of Client VMs in a Public Cloud MS Ratsoma, MT Dlamini, JHP Eloff, HS Venter 10th International Conference on Cyber Warfare and Security (ICCWS) 2015, 2015 | 3 | 2015 |
CBAC4C: conflict based allocation control for cloud MT Dlamini, JHP Eloff, MM Eloff The 9th International Conference for Internet Technology and Secured …, 2014 | 3 | 2014 |
Is buying and transacting online easier and safer than down town?: an emerging economy perspective E Martim, M Dlamini, D Van Greunen, J Eloff, ME Herselman | 3 | 2009 |
An Innovative Risk-based Authentication Mechanism for Closing the New Banking Vault M Dlamini, HS Venter, JHP Eloff of: The proceedings of the 3rd International Conference on Innovation and …, 2015 | 2 | 2015 |
A Budget Model for Information Security. M Dlamini, MM Eloff, JHP Eloff, HS Venter HAISA, 47-57, 2011 | 2 | 2011 |
Towards a privacy compliance assessment toolkit T Moabalobelo, S Ngobeni, B Molema, P Pantsi, M Dlamini, N Nelufule 2023 IST-Africa Conference (IST-Africa), 1-8, 2023 | 1 | 2023 |