- Network Security and Intrusion Detection
- Information and Cyber Security
- Advanced Malware Detection Techniques
- Cloud Data Security Solutions
- Access Control and Trust
- Privacy, Security, and Data Protection
- Cybercrime and Law Enforcement Studies
- Cloud Computing and Resource Management
- Peer-to-Peer Network Technologies
- Anomaly Detection Techniques and Applications
- ICT in Developing Communities
- Internet of Things and AI
- Innovative Approaches in Technology and Social Development
- Innovation and Socioeconomic Development
- Blockchain Technology Applications and Security
- Ethics and Social Impacts of AI
- Chaos-based Image/Signal Encryption
- Smart Grid Security and Resilience
- Advanced Data Storage Technologies
- Security and Verification in Computing
- User Authentication and Security Systems
- Spam and Phishing Detection
- Cryptographic Implementations and Security
- Smart Grid and Power Systems
- Privacy-Preserving Technologies in Data
Council for Scientific and Industrial Research
2020-2024
University of Pretoria
2008-2021
Institute for Security Studies
2021
University of South Africa
2020
University of KwaZulu-Natal
2014
Systems, Applications & Products in Data Processing (United Kingdom)
2009
The South African Protection of Personal Information Act (POPIA) No.4 2013 makes it illegal to collect, use, process or store personal information unless is done in accordance with the prescribed legal and regulatory clauses enshrined Act. Organisations should take stock they collect who share before can put controls place safeguard it. Failure comply POPIA may potentially expose responsible party its associated third parties steep penalties including possibly imprisonment up 10 years R10...
Southern Africa Telecommunication Networks and Applications Conference (SATNAC) 2017, 3-10 September Freedom of the Seas Cruise
Abstract For businesses to benefit from the many opportunities of cloud computing, they must first address a number security challenges, such as potential leakage confidential data unintended third parties. An inter‐VM (where VM is virtual machine) attack, also known cross‐VM one threat through which cloud‐hosted could be leaked attack exploits vulnerabilities between co‐resident guest VMs that share same infrastructure. In an attempt stop this paper uses principles logical analysis model...
The integration of fog and cloud computing in smart grids presents a promising approach to enhance the security efficiency energy management systems. This paper proposes lightweight cryptographic scheme tailored for fogcloud architectures secure grid communications. leverages distributed nature reduce latency while maintaining robust measures against cyber threats. By incorporating quantum-resistant techniques, proposed solution addresses unique challenges data confidentiality, integrity...
Cloud lntrastructures are vulnerable to serious data leakage threats. Tenants with conflicting interests, residing on a shared cloud infrastructure, can potentially view the of other tenants' by means inter-VM attacks. This paper discusses an innovative solution overcome this problem proposing requirements for so-called Conflict-Based Allocation Control (CBAC4C) model.
Introduction. Digital deception is a double-edged sword used by both blackhats and whitehats in cybersecurity. A status quo review of the reintroduction digital can reveal challenges initiatives show how information behaviour expertise might inform cybersecurity research vice versa. Aim. To use to links between stimulate further research. Method. Critical regarding using an lens. Findings. There need for that tackles from also bridge gap two fields link concepts with theories. Conclusions....