Moses Dlamini

ORCID: 0000-0001-8109-2979
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Advanced Malware Detection Techniques
  • Cloud Data Security Solutions
  • Access Control and Trust
  • Privacy, Security, and Data Protection
  • Cybercrime and Law Enforcement Studies
  • Cloud Computing and Resource Management
  • Peer-to-Peer Network Technologies
  • Anomaly Detection Techniques and Applications
  • ICT in Developing Communities
  • Internet of Things and AI
  • Innovative Approaches in Technology and Social Development
  • Innovation and Socioeconomic Development
  • Blockchain Technology Applications and Security
  • Ethics and Social Impacts of AI
  • Chaos-based Image/Signal Encryption
  • Smart Grid Security and Resilience
  • Advanced Data Storage Technologies
  • Security and Verification in Computing
  • User Authentication and Security Systems
  • Spam and Phishing Detection
  • Cryptographic Implementations and Security
  • Smart Grid and Power Systems
  • Privacy-Preserving Technologies in Data

Council for Scientific and Industrial Research
2020-2024

University of Pretoria
2008-2021

Institute for Security Studies
2021

University of South Africa
2020

University of KwaZulu-Natal
2014

Systems, Applications & Products in Data Processing (United Kingdom)
2009

10.1016/j.cose.2008.11.007 article EN Computers & Security 2008-12-12

The South African Protection of Personal Information Act (POPIA) No.4 2013 makes it illegal to collect, use, process or store personal information unless is done in accordance with the prescribed legal and regulatory clauses enshrined Act. Organisations should take stock they collect who share before can put controls place safeguard it. Failure comply POPIA may potentially expose responsible party its associated third parties steep penalties including possibly imprisonment up 10 years R10...

10.23919/ist-africa60249.2023.10187837 article EN 2021 IST-Africa Conference (IST-Africa) 2023-05-31

Southern Africa Telecommunication Networks and Applications Conference (SATNAC) 2017, 3-10 September Freedom of the Seas Cruise

10.21427/d7cg0f article EN 2017-09-01

Abstract For businesses to benefit from the many opportunities of cloud computing, they must first address a number security challenges, such as potential leakage confidential data unintended third parties. An inter‐VM (where VM is virtual machine) attack, also known cross‐VM one threat through which cloud‐hosted could be leaked attack exploits vulnerabilities between co‐resident guest VMs that share same infrastructure. In an attempt stop this paper uses principles logical analysis model...

10.1111/itor.12935 article EN International Transactions in Operational Research 2021-01-14

The integration of fog and cloud computing in smart grids presents a promising approach to enhance the security efficiency energy management systems. This paper proposes lightweight cryptographic scheme tailored for fogcloud architectures secure grid communications. leverages distributed nature reduce latency while maintaining robust measures against cyber threats. By incorporating quantum-resistant techniques, proposed solution addresses unique challenges data confidentiality, integrity...

10.59200/iconic.2024.020 article EN International Conference on Intelligent and Innovative Computing Applications 2024-11-30

Cloud lntrastructures are vulnerable to serious data leakage threats. Tenants with conflicting interests, residing on a shared cloud infrastructure, can potentially view the of other tenants' by means inter-VM attacks. This paper discusses an innovative solution overcome this problem proposing requirements for so-called Conflict-Based Allocation Control (CBAC4C) model.

10.1109/icitst.2014.7038854 article EN 2014-12-01

Introduction. Digital deception is a double-edged sword used by both blackhats and whitehats in cybersecurity. A status quo review of the reintroduction digital can reveal challenges initiatives show how information behaviour expertise might inform cybersecurity research vice versa. Aim. To use to links between stimulate further research. Method. Critical regarding using an lens. Findings. There need for that tackles from also bridge gap two fields link concepts with theories. Conclusions....

10.47989/irisic2018 article EN cc-by-nd 2020-12-15
Coming Soon ...