- Information and Cyber Security
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Access Control and Trust
- Security and Verification in Computing
- Digital and Cyber Forensics
- Cybercrime and Law Enforcement Studies
- Service-Oriented Architecture and Web Services
- Spam and Phishing Detection
- Software Engineering Research
- Privacy, Security, and Data Protection
- Cybersecurity and Cyber Warfare Studies
- User Authentication and Security Systems
- Digital Media Forensic Detection
- Software System Performance and Reliability
- Internet Traffic Analysis and Secure E-voting
- Cloud Data Security Solutions
- Misinformation and Its Impacts
- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Business Process Modeling and Analysis
- ICT in Developing Communities
- Cognitive Science and Mapping
- Anomaly Detection Techniques and Applications
- Big Data and Business Intelligence
University of Pretoria
2015-2024
Council for Scientific and Industrial Research
2020
University of South Africa
2020
Zuid-Afrikaans Hospital
1993-2017
Tshwane University of Technology
2015
Empowerment Program
2012
University of Tulsa
2006
South African Reserve Bank
2005
University of Johannesburg
1985-2001
ABSTRACT Information security culture develops in an organization due to certain actions taken by the organization. Management implements information components, such as policies and technical measures with which employees interact that they include their working procedures. Employees develop perceptions exhibit behavior, reporting of incidents or sharing passwords, could either contribute be a threat securing assets. To inculcate acceptable level culture, must govern effectively...
There are a growing number of people who hold accounts on social media platforms (SMPs) but hide their identity for malicious purposes. Unfortunately, very little research has been done to date detect fake identities created by humans, especially so SMPs. In contrast, many examples exist cases where bots or computers have detected successfully using machine learning models. the case these models were dependent employing engineered features, such as “friend-to-followers ratio.”These features...
Separation of duty, as a security principle, has its primary objective the prevention fraud and errors. This is achieved by disseminating tasks associated privileges for specific business process among multiple users. principle demonstrated in traditional example separation duty found requirement two signatures on check. Previous work requirements often explored implementations based role-based access control (RBAC) principles. These are concerned with constraining associations between RBAC...
The authors have developed a software methodology that improves security by using typing biometrics to reinforce password authentication mechanisms. Typing is the analysis of user's keystroke patterns. Each user has unique way keyboard enter password; for example, each types characters constitute at different speeds. employs fuzzy logic measure biometrics. This reinforcement transparent-indiscernible users while they are entering normal authentication.
Recently, network intrusion attacks, particularly new unknown attacks referred to as zero-day have become a global phenomenon. Zero-day constitute frequent cybersecurity threat, they seek exploit the vulnerabilities of system. Previous studies demonstrated that can compromise for prolonged periods if traffic analysis (NTA) is not performed thoroughly and efficiently. NTA plays crucial role in supporting machine learning (ML) based detection systems (NIDS) by monitoring extracting meaningful...
Information security management needs a paradigm shift in order to successfully protect information assets. Organisations must change the holistic of security, requiring well-established Security Management System (ISMS). An ISMS addresses all aspects an organisation that deals with creating and maintaining secure environment. Organisational their staff manage cost-effectively can use ISMS. It also help assessment trustworthiness organisation's arrangements by other organisations....
Human observation and intuition form the basis of any risk assessment. The authors propose a cognitive fuzzy modeling approach to assessment in health care institutions, building on logic's great potential dealing with vague information human common sense intuition.
Abstract Users of online social network (OSN) platforms, e.g. Twitter, are not always humans, and bots (referred to as bots) highly prevalent. State-of-the-art research demonstrates that can be broadly categorized either malicious or benign. From a cybersecurity perspective, the behaviors benign differ. Malicious often controlled by botmaster who monitors their activities perform engineering web scraping attacks collect user information. Consequently, it is imperative classify on basis...