Author of the publication

A Simulation of Logical Traffic Isolation Using Differentiated Services.

, , and . WDFIA, page 20-32. Plymouth University, UK, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visualization of a data leak., , and . ISSA, page 1-8. IEEE, (2013)Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps., , , , , , , and . ACM Trans. Cyber Phys. Syst., 3 (4): 36:1-36:21 (2019)Proposed Model for a Cybersecurity Centre of Innovation for South Africa., , , and . HCC, volume 431 of IFIP Advances in Information and Communication Technology, page 293-306. Springer, (2014)Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks., , , , and . Sensors, 23 (24): 9856 (December 2023)On the viability of pro-active automated PII breach detection: A South African case study., , and . SAICSIT, page 251. ACM, (2014)Towards Improving the Adoption and Usage of National Digital Identity Systems., , , , and . ASE, page 223:1-223:6. ACM, (2022)Simulating cyber security management: A gamified approach to executive decision making., , , and . ASE, page 222:1-222:8. ACM, (2022)Government Mobile Apps: Analysing Citizen Feedback via App Reviews., , , and . ASE, page 1858-1863. IEEE, (2023)My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media., , , , , and . WISE (2), volume 10570 of Lecture Notes in Computer Science, page 528-539. Springer, (2017)Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer., , , , , , and . WISE (2), volume 12343 of Lecture Notes in Computer Science, page 185-200. Springer, (2020)