Follow
Marthie Grobler
Marthie Grobler
Principal Research Scientist, CSIRO's Data61
Verified email at data61.csiro.au
Title
Cited by
Cited by
Year
Backdoor attacks against transfer learning with pre-trained deep learning models
S Wang, S Nepal, C Rudolph, M Grobler, S Chen, T Chen
IEEE Transactions on Services Computing 15 (3), 1526-1539, 2020
1182020
User, usage and usability: Redefining human centric cyber security
M Grobler, R Gaire, S Nepal
Frontiers in big Data 4, 583723, 2021
802021
Will they use it or not? Investigating software developers’ intention to follow privacy engineering methodologies
A Senarath, M Grobler, NAG Arachchilage
ACM Transactions on Privacy and Security (TOPS) 22 (4), 1-30, 2019
602019
Security and performance considerations in ros 2: A balancing act
J Kim, JM Smereka, C Cheung, S Nepal, M Grobler
arXiv preprint arXiv:1809.09566, 2018
592018
Blockchain for secure location verification
MR Nosouhi, S Yu, W Zhou, M Grobler, H Keshtiar
Journal of Parallel and Distributed Computing 136, 40-51, 2020
542020
Systematic literature review on cyber situational awareness visualizations
L Jiang, A Jayatilaka, M Nasim, M Grobler, M Zahedi, MA Babar
Ieee Access 10, 57525-57554, 2022
482022
A general morphological analysis: delineating a cyber-security culture
N Gcaza, R Von Solms, MM Grobler, JJ Van Vuuren
Information & Computer Security 25 (3), 259-278, 2017
452017
Digital forensic readiness: Are we there yet
A Mouhtaropoulos, CT Li, M Grobler
J. Int't Com. L. & Tech. 9, 173, 2014
452014
Towards spoofing resistant next generation IoT networks
MR Nosouhi, K Sood, M Grobler, R Doss
IEEE Transactions on Information Forensics and Security 17, 1669-1683, 2022
422022
A high-level comparison between the South African protection of personal information act and international data protection laws
J Botha, MM Grobler, J Hahn, M Eloff
ICMLG2017 5th International Conference on Management Leadership and …, 2017
372017
Implementation of a cyber security policy in South Africa: Reflection on progress and the way forward
M Grobler, JJ van Vuuren, L Leenen
IFIP International Conference on Human Choice and Computers, 215-225, 2012
372012
Local differential privacy for federated learning
MAP Chamikara, D Liu, S Camtepe, S Nepal, M Grobler, P Bertok, I Khalil
arXiv preprint arXiv:2202.06053, 2022
352022
Digital forensic readiness: an insight into governmental and academic initiatives
A Mouhtaropoulos, M Grobler, CT Li
2011 European Intelligence and Security Informatics Conference, 191-196, 2011
342011
Pasport: A secure and private location proof generation and verification framework
MR Nosouhi, K Sood, S Yu, M Grobler, J Zhang
IEEE Transactions on Computational Social Systems 7 (2), 293-307, 2020
312020
Common challenges faced during the establishment of a CSIRT
M Grobler, H Bryk
2010 Information Security for South Africa, 1-6, 2010
312010
Live forensic acquisition as alternative to traditional forensic processes
M Lessing, B Von Solms
IT Management and IT Forensics 2008, 2008
292008
Towards an artificial intelligence framework to actively defend cyberspace
M Masombuka, M Grobler, B Watson
European Conference on Cyber Warfare and Security, 589-XIII, 2018
272018
Evaluating cyber security awareness in South Africa
M Grobler, J Jansen Van Vuuren, J Zaaiman
Proceedings of the 10th European Conference on Information Warfare and …, 2011
272011
A dynamic access control policy model for sharing of healthcare data in multiple domains
AS Shahraki, C Rudolph, M Grobler
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
262019
UCoin: An efficient privacy preserving scheme for cryptocurrencies
MR Nosouhi, S Yu, K Sood, M Grobler, R Jurdak, A Dorri, S Shen
IEEE Transactions on Dependable and Secure Computing 20 (1), 242-255, 2021
252021
The system can't perform the operation now. Try again later.
Articles 1–20