
MT DlaminiUniversity of Pretoria | UP · Department of Computer Science
MT Dlamini
Doctor of Philosophy
About
15
Publications
2,021
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
208
Citations
Citations since 2017
Publications
Publications (15)
For businesses to benefit from the many opportunities of cloud computing, they must first address a number of security challenges, such as the potential leakage of confidential data to unintended third parties. An inter‐VM (where VM is virtual machine) attack, also known as cross‐VM attack, is one threat through which cloud‐hosted confidential data...
Introduction. Digital deception is a double-edged sword used by both blackhats and whitehats in cybersecurity. A status quo review of the reintroduction of digital deception can reveal challenges and initiatives and show how information behaviour expertise might inform cybersecurity research and vice versa. Aim. To use a status quo review of digita...
"Know yourself, the terrain of the battlefield and the enemy, you need not fear the result of a hundred battles" Sun Tzu. Abstract: In the cyberspace, system defenders might have an idea of their own cybersecurity defense systems, but they surely have a partial view of the cyberspace battlefield and almost zero knowledge of the attackers. Evidently...
This paper investigates how to effectively stop an attacker from using compromised user credentials to gain authorized entry to systems that they are otherwise not authorised to access. The proposed solution extends previous work to move beyond a risk-based multi-factor authentication system. It adds a behavioural analytics component that uses keys...
Computer viruses have become complex and operates in a stealth mode to avoid detection. New viruses are argued to be created each and every day. However, most of these supposedly ‘new’ viruses are not completely new. Most of the supposedly ‘new’ viruses are not necessarily created from scratch with completely new (something novel that has never bee...
Cloud lntrastructures are vulnerable to serious data leakage threats. Tenants with conflicting interests, residing on a shared cloud infrastructure, can potentially view the data of other potentially conflicting tenants' by means of inter-VM attacks. This paper discusses an innovative solution to overcome this data leakage problem by proposing the...
This chapter demonstrates how interoperability can serve as a catalyst for business innovation. It explores its core definitions and illustrates relevance and applicability thereof through a use case: Business in Your Pocket (BiYP) use case, that enforces value co-creation amongst business ecosystem partners. The BiYP use case clearly indicates tha...
The increasing demand for on-line and real-time interaction with IT infrastructures by endusers are facilitated by the proliferation of user centric devices such as laptops, iPods, iPads, and smartphones. This trend is furthermore propounded by the plethora of apps down loadable to end-user devices mostly within mobile-cum-cloud environments. It is...
For the past forty years, security experts have spent billions of dollars trying to improve security technologies. However, security systems are continually failing to protect end users' information systems and their information. Security experts claim that the end users are the weakest link in the security chain, and the end users claim that secur...
4th International Conference on Information Warfare and Security, Cape Town, South Africa, 26-27 March 2009 Security and usability are crucial factors for the successful of any e-commerce system. However, they have traditionally been considered a design trade-off. In an effort to align them, this paper highlights the design principles and guideline...
The entire business landscape finds itself on the verge of a recession because of ongoing global economic turmoil. Thus, there is a heightened need to minimise and mitigate business risk and scrutinise information spending while ensuring compliance with regulatory mandates. This calls for decision makers to become vigilant in their spending and mov...
Information security has evolved from addressing minor and harmless security breaches to managing those with a huge impact on organisations' economic growth. This paper investigates the evolution of information security; where it came from, where it is today and the direction in which it is moving. It is argued that information security is not abou...
3rd CompanionAble Workshop – IoPTS, Novotel Brussels - Brussels, 2 December 2009 The Future Internet will consist of billions of people, things and services having the potential to interact with each other and their environment. This highly interconnected global network structure presents new types of challenges from a security, trust and privacy p...
Southern Africa Telecommunication Networks and Applications Conference (SATNAC 2009), Swaziland, 30 August-2 September 2009 Information security is becoming a major concern for most worldwide telecommunication companies and more so as we move towards the future Internet of Things. In this era, a plethora of digital devices, people and other physica...