Marthie Grobler

Orcid: 0000-0001-6933-0145

According to our database1, Marthie Grobler authored at least 80 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cybersecurity when working from home during COVID-19: considering the human factors.
J. Cybersecur., January, 2024

A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection.
CoRR, 2024

2023
Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks.
Sensors, December, 2023

DACP: Enforcing a dynamic access control policy in cross-domain environments.
Comput. Networks, December, 2023

Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

How Does Visualisation Help App Practitioners Analyse Android Apps?
IEEE Trans. Dependable Secur. Comput., 2023

UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies.
IEEE Trans. Dependable Secur. Comput., 2023

Report on the 4th Workshop on Human-Centric Software Engineering & Cyber Security (HCSE&CS 2023).
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, 2023

Government Mobile Apps: Analysing Citizen Feedback via App Reviews.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

2022
Defending Adversarial Attacks via Semantic Feature Manipulation.
IEEE Trans. Serv. Comput., 2022

Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models.
IEEE Trans. Serv. Comput., 2022

OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning.
IEEE Trans. Parallel Distributed Syst., 2022

Adversarial Detection by Latent Style Transformations.
IEEE Trans. Inf. Forensics Secur., 2022

Towards Spoofing Resistant Next Generation IoT Networks.
IEEE Trans. Inf. Forensics Secur., 2022

Report on the 2nd Workshop on Human Centric Software Engineering & Cyber Security (HCSE&CS 2021).
ACM SIGSOFT Softw. Eng. Notes, 2022

Editorial: Human-Centric Security and Privacy.
Frontiers Big Data, 2022

Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches.
CoRR, 2022

Local Differential Privacy for Federated Learning in Industrial Settings.
CoRR, 2022

Systematic Literature Review on Cyber Situational Awareness Visualizations.
IEEE Access, 2022

Simulating cyber security management: A gamified approach to executive decision making.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Towards Improving the Adoption and Usage of National Digital Identity Systems.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy.
Proceedings of the International Joint Conference on Neural Networks, 2022

Smart Contract-based Consensus Building for Collaborative Medical Decision-Making.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Simplifying Cyber Security Maturity Models through National Culture: A Fuzzy Logic Approach.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Local Differential Privacy for Federated Learning.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
The importance of social identity on password formulations.
Pers. Ubiquitous Comput., 2021

"Who Wants to Know all this Stuff?!": Understanding Older Adults' Privacy Concerns in Aged Care Monitoring Devices.
Interact. Comput., 2021

User, Usage and Usability: Redefining Human Centric Cyber Security.
Frontiers Big Data, 2021

Robust Training Using Natural Transformation.
CoRR, 2021

OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning.
CoRR, 2021

Software developers need help too! Developing a methodology to analyse cognitive dimension-based feedback on usability.
Behav. Inf. Technol., 2021

ACSIMA: A Cyber Security Index for Mobile Health Apps.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Microwave Link Failures Prediction via LSTM-based Feature Fusion Network.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
PASPORT: A Secure and Private Location Proof Generation and Verification Framework.
IEEE Trans. Comput. Soc. Syst., 2020

Blockchain for secure location verification.
J. Parallel Distributed Comput., 2020

Adversarial Defense by Latent Style Transformations.
CoRR, 2020

Defending Adversarial Attacks via Semantic Feature Manipulation.
CoRR, 2020

Generating Semantic Adversarial Examples via Feature Manipulation.
CoRR, 2020

Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Attribute-Based Data Access Control for Multi-Authority System.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Privacy by Design in Aged Care Monitoring Devices? Well, Not Quite Yet!
Proceedings of the OzCHI '20: 32nd Australian Conference on Human-Computer-Interaction, 2020

mHealth4U: designing for health and wellbeing self-management.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020

OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

PART-GAN: Privacy-Preserving Time-Series Sharing.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020

Towards a Trusted Collaborative Medical Decision-Making Platform.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

2019
Will They Use It or Not? Investigating Software Developers' Intention to Follow Privacy Engineering Methodologies.
ACM Trans. Priv. Secur., 2019

Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
ACM Trans. Cyber Phys. Syst., 2019

Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media.
IEEE Access, 2019

A Dynamic Access Control Policy Model for Sharing of Healthcare Data in Multiple Domains.
Proceedings of the 18th IEEE International Conference On Trust, 2019

HSDC-Net: Secure Anonymous Messaging in Online Social Networks.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Dynamic Cross-Domain Access Control Model for Collaborative Healthcare Application.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

A Model for System Developers to Measure the Privacy Risk of Data.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Fuzzy Logic Application to Link National Culture and Cybersecurity Maturity.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

2018
Security and Performance Considerations in ROS 2: A Balancing Act.
CoRR, 2018

Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
CoRR, 2018

SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification.
Proceedings of the IEEE Global Communications Conference, 2018

2017
A general morphological analysis: delineating a cyber-security culture.
Inf. Comput. Secur., 2017

My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

2016
Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion.
Int. J. Cyber Warf. Terror., 2016

Ethical and Legal Issues Involved in the Pro-active Collection of Personal Information with the Aim of Reducing Online Disclosure.
Proceedings of the Technology and Intimacy: Choice or Coercion, 2016

2015
Logic Tester for the Classification of Cyberterrorism Attacks.
Int. J. Cyber Warf. Terror., 2015

2014
On the viability of pro-active automated PII breach detection: A South African case study.
Proceedings of the Southern African Institute for Computer Scientist and Information Technologists Annual Conference 2014, 2014

Towards a platform to visualize the state of South Africa's information security.
Proceedings of the 2014 Information Security for South Africa, 2014

Proposed Model for a Cybersecurity Centre of Innovation for South Africa.
Proceedings of the ICT and Society, 2014

On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain.
Proceedings of the ICT and Society, 2014

2013
Visualization of a data leak.
Proceedings of the 2013 Information Security for South Africa, 2013

2012
The Need for Digital Evidence Standardisation.
Int. J. Digit. Crime Forensics, 2012

Cyber Security Awareness as Critical Driver to National Security.
Int. J. Cyber Warf. Terror., 2012

Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward.
Proceedings of the ICT Critical Infrastructures and Society, 2012

Proactive Digital Forensics: The Ever-Increasing Need for Standardization.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

2011
Towards a Cyber security aware rural community.
Proceedings of the Information Security South Africa Conference 2011, 2011

Digital Forensic Readiness: An Insight into Governmental and Academic Initiatives.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

2010
Broadband broadens scope for cyber crime in Africa.
Proceedings of the Information Security South Africa Conference 2010, 2010

Common problems faced during the establishment of a CSIRT.
Proceedings of the Information Security South Africa Conference 2010, 2010

Phishing for Fortune.
Proceedings of the Information Security South Africa Conference 2010, 2010

Digital forensic standards: international progress.
Proceedings of the South African Information Security Multi-Conference, 2010

2009
A Simulation of Logical Traffic Isolation Using Differentiated Services.
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009

Information Security Policies for Governmental Organisations, The Minimum Criteria.
Proceedings of the Information Security South Africa Conference 2009, 2009

A Best Practice Approach to Live Forensic Acquisition.
Proceedings of the Information Security South Africa Conference 2009, 2009


  Loading...