Marthie Grobler
Orcid: 0000-0001-6933-0145
According to our database1,
Marthie Grobler
authored at least 83 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Cybersecur., January, 2024
IEEE Trans. Dependable Secur. Comput., 2024
The prince of insiders: a multiple pathway approach to understanding IP theft insider attacks.
Inf. Comput. Secur., 2024
Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far Have We Gone?
CoRR, 2024
A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection.
CoRR, 2024
2023
Sensors, December, 2023
Comput. Networks, December, 2023
Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Report on the 4th Workshop on Human-Centric Software Engineering & Cyber Security (HCSE&CS 2023).
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning.
IEEE Trans. Parallel Distributed Syst., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Report on the 2nd Workshop on Human Centric Software Engineering & Cyber Security (HCSE&CS 2021).
ACM SIGSOFT Softw. Eng. Notes, 2022
Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches.
CoRR, 2022
IEEE Access, 2022
Simulating cyber security management: A gamified approach to executive decision making.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy.
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
Simplifying Cyber Security Maturity Models through National Culture: A Fuzzy Logic Approach.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
Pers. Ubiquitous Comput., 2021
"Who Wants to Know all this Stuff?!": Understanding Older Adults' Privacy Concerns in Aged Care Monitoring Devices.
Interact. Comput., 2021
Frontiers Big Data, 2021
OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning.
CoRR, 2021
Software developers need help too! Developing a methodology to analyse cognitive dimension-based feedback on usability.
Behav. Inf. Technol., 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
2020
IEEE Trans. Comput. Soc. Syst., 2020
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the OzCHI '20: 32nd Australian Conference on Human-Computer-Interaction, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020
2019
Will They Use It or Not? Investigating Software Developers' Intention to Follow Privacy Engineering Methodologies.
ACM Trans. Priv. Secur., 2019
Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
ACM Trans. Cyber Phys. Syst., 2019
Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media.
IEEE Access, 2019
A Dynamic Access Control Policy Model for Sharing of Healthcare Data in Multiple Domains.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
A Dynamic Cross-Domain Access Control Model for Collaborative Healthcare Application.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
2018
Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
CoRR, 2018
SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification.
Proceedings of the IEEE Global Communications Conference, 2018
2017
Inf. Comput. Secur., 2017
My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
2016
Int. J. Cyber Warf. Terror., 2016
Ethical and Legal Issues Involved in the Pro-active Collection of Personal Information with the Aim of Reducing Online Disclosure.
Proceedings of the Technology and Intimacy: Choice or Coercion, 2016
2015
Int. J. Cyber Warf. Terror., 2015
2014
On the viability of pro-active automated PII breach detection: A South African case study.
Proceedings of the Southern African Institute for Computer Scientist and Information Technologists Annual Conference 2014, 2014
Proceedings of the 2014 Information Security for South Africa, 2014
Proceedings of the ICT and Society, 2014
On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain.
Proceedings of the ICT and Society, 2014
2013
Proceedings of the 2013 Information Security for South Africa, 2013
2012
Int. J. Cyber Warf. Terror., 2012
Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward.
Proceedings of the ICT Critical Infrastructures and Society, 2012
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012
2011
Proceedings of the Information Security South Africa Conference 2011, 2011
Proceedings of the European Intelligence and Security Informatics Conference, 2011
2010
Proceedings of the Information Security South Africa Conference 2010, 2010
Proceedings of the Information Security South Africa Conference 2010, 2010
Proceedings of the Information Security South Africa Conference 2010, 2010
Proceedings of the South African Information Security Multi-Conference, 2010
2009
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009
Proceedings of the Information Security South Africa Conference 2009, 2009
Proceedings of the Information Security South Africa Conference 2009, 2009