Research Publications: Reverse Chronological Order
Book Chapters
- Victor R. Kebande, R. Ikuesan (2022). Towards a Learning-enabled Virtual Sensor Forensics Architecture
- Baror, S. O., Venter, H. S., & Kebande, V. R. (2021, November). Conceptual Model for Crowd-Sourcing Digital Forensic Evidence. In The Proceedings of the International Conference on Smart City Applications (pp. 1085-1099). Springer, Cham.https://link.springer.com/chapter/10.1007/978-3-030-94191-8_88
- Victor R. Kebande, N.Karie, R. Ikuesan (2022). A Review of Blockchain Forensic Challenges https://www.springer.com/gp/book/9783030705008
- Baror, S. O., Venter, H. S., & Kebande, V. R. (2021). A Framework for Concurrent Contact-Tracing and Digital Evidence Analysis in Heterogeneous Environments. Innovations in Smart Cities Applications Volume 4, 183, 1183https://link.springer.com/chapter/10.1007/978-3-030-66840-2_90
- P. Phsthutshedzo, H.S. Venter, V.R Kebande, Richard A. Ikuesan, Nickson M. Karie (2021). Cursory view of IoT-Forensic Readiness Framework based on ISO/IEC 27043 Recommendations, in Emerging Applications and Technologies for Industry 4.0, https://www.springer.com/gp/book/9783030802158
Journal articles and Conference Papers
2024
- V. R. Kebande and A.Awad (2023). Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions, ACM Computing Surveys https://dl.acm.org/doi/abs/10.1145/3635030
- Yang, F., Ismail, N. A., Pang, Y. Y., Kebande, V. R., Ai-Dhaqm, A., & Koh, T. W. (2024). A Systematic Literature Review of Deep Learning Approaches for Sketch-Based Image Retrieval: Datasets, Metrics, and Future Directions. IEEE Access.https://ieeexplore.ieee.org/abstract/document/10413476
- S. Alawadi, K.Alkharabsheh, F. Alkhabbas, V.R. Kebande, F.M Awaysheh, F. Palomba, M.Awad, (2024). FedCSD: A Federated Learning Based Approach for Code-Smell Detection, IEEE Access
2023
- V. R. Kebande and J. Ding, “Blockchain-Enabled Renewable Energy Traceability with a Crypto-based Arbitrage Pricing Model,” 2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC), Tartu, Estonia, 2023, pp. 34-41, doi: 10.1109/FMEC59375.2023.10306021.https://ieeexplore.ieee.org/document/10306021
- Adeopatoye, R., Ikuesan, R. A., Hungwe, T., Kebande, V., & Sookhak, M. (2023, May). Towards an Open-Source Based E-Mail Forensic Tool that uses Headers in Digital Investigation. In Proceedings of the 6th International Conference on Networking, Intelligent Systems & Security (pp. 1-8).https://dl.acm.org/doi/pdf/10.1145/3607720.3607739
- Nurul Momen, VR Kebande (2023). Constructivism in Second Life: Fostering Active Learning through Teacher-assisted Virtualized Virtual Environments.https://www.diva-portal.org/smash/get/diva2:1806230/FULLTEXT01.pdf
- Kebande, V. R. (2023). Extended-Chacha20 Stream Cipher with Enhanced Quarter Round Function. IEEE Access.https://ieeexplore.ieee.org/document/10285091?source=authoralert
- S Hasib, A Ullah, Fasee, Ullah, VR Kebande, S Ullah, A Al-Dhaqm (2023).Forecasting and Trading of the Stable Cryptocurrencies with Machine Learning and Deep Learning Algorithms for Market Analytics.https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=10295476
- Galozy, A., Alawadi, S., Kebande, V., & Nowaczyk, S. (2023). Beyond Random Noise: Insights on Anonymization Strategies from a Latent Bandit Study. arXiv preprint arXiv:2310.00221.https://arxiv.org/abs/2310.00221
- Tkachuk, R. V., Ilie, D., Robert, R., Kebande, V., & Tutschku, K. (2023). Towards efficient privacy and trust in decentralized blockchain-based peer-to-peer renewable energy marketplace. Sustainable Energy, Grids and Networks, 35, 101146.https://www.sciencedirect.com/science/article/pii/S2352467723001546
- Persson, J. A., Bugeja, J., Davidsson, P., Holmberg, J., Kebande, V. R., Mihailescu, R. C., … & Tegen, A. (2023). The Concept of Interactive Dynamic Intelligent Virtual Sensors (IDIVS): Bridging the Gap between Sensors, Services, and Users through Machine Learning. Applied Sciences, 13(11), 6516.https://www.mdpi.com/2076-3417/13/11/6516
- Alawadi, S., Alkharabsheh, K., Alkhabbas, F., Kebande, V., Awaysheh, F. M., & Palomba, F. (2023). FedCSD: A Federated Learning Based Approach for Code-Smell Detection. arXiv preprint arXiv:2306.00038.https://arxiv.org/pdf/2306.00038.pdf
- Roman-Valentyn Tkachuk, Dragos Ilie, Remi Robert, Victor Kebande, Kurt Tutschku (2023).On the performance and scalability of consensus mechanisms in privacy-enabled decentralized renewable energy marketplace.
- Tkach, Volodymyr.; Kudin, A.;Kebande, V.R.; Baranovskyi, Oleksii.;Kudin, I. Non-Pattern-BasedAnomaly Detection in Time-Series.Electronics 2023, 12, 721. https://doi.org/10.3390/electronics12030721
(PDF) Non-Pattern-Based Anomaly Detection in Time-Series. Available from: [accessed Feb 02 2023].https://www.mdpi.com/2079-9292/12/3/721 - Tkachuk, R. V., Ilie, D., Robert, R., Kebande, V., & Tutschku, K. (2023, March). On the Performance of Consensus Mechanisms in Privacy-Enabled Decentralized Peer-to-Peer Renewable Energy Marketplace. In 2023 26th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN) (pp. 179-186). IEEE.https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10073510
2022
- Kebande, V. R. (2022). Industrial internet of things (IIoT) forensics: The forgotten concept in the race towards industry 4.0. Forensic Science International: Reports, 5, 100257.https://www.sciencedirect.com/science/article/pii/S2665910722000032
- Khalid Alkharabsheh, Sadi Alawadi, Victor R Kebande, Yania Crespo, Manuel Fernández-Delgado, José A. Taboada (2021).A Comparison of Machine Learning Algorithms on Design Smell Detection Using Balanced and Imbalanced Dataset: A Study of God Class, in Information and Software Technology Journal. https://www.sciencedirect.com/science/article/pii/S0950584921001865
- Alkhabbas, Fahed, Mohammed Alsadi, Sadi Alawadi, Feras M. Awaysheh, Victor R. Kebande, and Mahyar T. Moghaddam. “ASSERT: A Blockchain-Based Architectural Approach for Engineering Secure Self-Adaptive IoT Systems.” Sensors 22, no. 18 (2022): 6842. https://www.mdpi.com/1424-8220/22/18/6842
- Azhan, Nor Amira Nor, Richard Adeyemi Ikuesan, Shukor Abd Razak, and Victor R. Kebande. “Error Level Analysis Technique for Identifying JPEG Block Unique Signature for Digital Forensic Analysis.” Electronics 11, no. 9 (2022): 1468. https://www.mdpi.com/2079-9292/11/9/1468
- Kebande, V. R., Ikuesan, R. A., Awaysheh, F. M., & Alawadi, S. (2021, November). Towards a Learning-enabled Virtual Sensor Forensic Architecture Compliant with Edge Intelligence. In 2021 Second International Conference on Intelligent Data Science Technologies and Applications (IDSTA) (pp. 154-161). IEEE.https://ieeexplore.ieee.org/document/9660795
2021
- Kebande, V. R., Awaysheh, F., Ikuesan, R., Alawadi, S., & Alshehri, M. (2021). A Blockchain-Based Multi-Factor Authentication Model for Cloud-Enabled Internet of Vehicles.https://www.mdpi.com/1424-8220/21/18/6018/htm
- Karie, N. M., Masri Sahri, N., Yang, W., Valli, C., & Kebande, V. R. (2021). A Review of Security Standards and Frameworks for IoT-Based Smart Environments. IEEE Access.https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9528421
- Kebande, V. R., & Choo, K. K. R. (2021). Finite state machine for cloud forensic readiness as a service (CFRaaS) events. Security and Privacy, e182.https://onlinelibrary.wiley.com/doi/full/10.1002/spy2.182
- Al-Dhaqm, A., Ikuesan, R. A.,Razak, S., R Kebande, V., & Fahad Ghabban, S. (2021). Research Challenges and Opportunities in Drone Forensics Models. Electronics Journal,-MDPI 6(2).
- Sadi Alawadi, Victor R. Kebande, Yuji Dong, Joseph Bugeja, Jan.A. Persson, Carl Magnus Olsson (2021). A Federated Interactive Learning IoT-based Health Monitoring Platform, in the 25th European Conference on Advances in Databases and Information Systems, 25th August, 2021,https://link.springer.com/chapter/10.1007/978-3-030-85082-1_21
- Zawali, B., Ikuesan, R. A., Kebande, V. R., & Furnell, S. (2021). Realising a Push Button Modality for Video-Based Forensics. Infrastructures, 6(4), 54.https://www.mdpi.com/2412-3811/6/4/54
- Kebande, Victor R., et al. “Active Machine Learning Adversarial Attack Detection in the User Feedback Process.” IEEE Access 9 (2021): 36908-36923.https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9366529
- Kebande, V. R., Karie, N. M., Choo, K. K. R., & Alawadi, S. (2021). Digital forensic readiness intelligence crime repository. Security and Privacy, e151.https://onlinelibrary.wiley.com/doi/pdf/10.1002/spy2.151
- Makura, S., Venter, H. S., Kebande, V. R., Karie, N. M., Ikuesan, R. A., & Alawadi, S. (2021). Digital forensic readiness in operational cloud leveraging ISO/IEC 27043 guidelines on security monitoring. Security and Privacy, e149.https://onlinelibrary.wiley.com/doi/pdf/10.1002/spy2.149
- Kebande, V. R., Karie, N. M., & Ikuesan, R. A. (2021). Real-time monitoring as a supplementary security component of vigilantism in modern network environments. International Journal of Information Technology, 13(1), 5-17.https://link.springer.com/article/10.1007/s41870-020-00585-8
- Al-Dhaqm, A., Razak, S., Ikuesan, R. A., R Kebande, V.R, & Hajar Othman, S. (2021). Face Validation of Database Forensic Investigation Metamodel. Infrastructures, 6(2), 13.https://www.mdpi.com/2412-3811/6/2/13
- Al-Dhaqm, A., Razak, S., & Ikuesan, R. A. (2021). Kebande, V.R; Hajar Othman, S. Face Validation of Database Forensic Investigation Metamodel. Infrastructures 2021, 6, 13.https://www.mdpi.com/2412-3811/6/2/13
- Victor R. Kebande, N.Karie, R. Ikuesan, M. Sookhak, H.S.Venter (2020). A Lightweight Blockchain-Based Multi-Factor Authentication Scheme for IoT Smart Cities that Integrates SSO and SAML in the Cloud for Sustainable Computing Technologies
2020
- Al-Dhaqm, A., Abd Razak, S., Dampier, D. A., Choo, K. K. R., Siddique, K., Ikuesan, R. A., … & Kebande, V. R. (2020). Categorization and organization of database forensic investigation processes. IEEE Access, 8, 112846-112858.https://ieeexplore.ieee.org/abstract/document/9110909
- Kebande, V. R., Bugeja, J., & Persson, J. A. (2020). Internet of threats introspection in dynamic intelligent virtual sensing. arXiv preprint arXiv:2006.11801.https://arxiv.org/abs/2006.11801
- Kebande, V. R., Karie, N. M., Ikuesan, R. A., & Venter, H. S. (2020). Ontology‐driven perspective of CFRaaS. Wiley Interdisciplinary Reviews: Forensic Science, 2(5), e1372.https://onlinelibrary.wiley.com/doi/full/10.1002/wfs2.1372
- Al-Dhaqm, A., Abd Razak, S., Ikuesan, R. A., Kebande, V. R., & Siddique, K. (2020). A Review of Mobile Forensic Investigation Process Models. IEEE Access, 8, 173359-173375.https://ieeexplore.ieee.org/abstract/document/9160916
- Al-Dhaqm, A., Abd Razak, S., Siddique, K., Ikuesan, R. A., & Kebande, V. R. (2020). Towards the Development of an Integrated Incident Response Model for Database Forensic Investigation Field. IEEE Access, 8, 145018-145032.https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9139233
- Makura, S. M., Venter, H. S., Ikuesan, R. A., Kebande, V. R., & Karie, N. M. (2020, February). Proactive forensics: keystroke logging from the cloud as potential digital evidence for forensic readiness purposes. In 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) (pp. 200-205). IEEE.https://ieeexplore.ieee.org/abstract/document/9089494
- Mlotshwa, L. L., Makura, S. M., Karie, N. M., & Kebande, V. R. (2020, September). Opportunistic security architecture for osmotic computing paradigm in dynamic IoT-Edge’s resource diffusion. In Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications (pp. 1-7).https://dl.acm.org/doi/abs/10.1145/3415088.3415097
- Kebande, V. R., & Ikuesan, R. A. (2020, September). Virtual sensor forensics. In Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications (pp. 1-6).https://dl.acm.org/doi/abs/10.1145/3415088.3415117
- Karie, N. M., Kebande, V. R., Ikuesan, R. A., Sookhak, M., & Venter, H. S. (2020, March). Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud. In Proceedings of the 3rd International Conference on Networking, Information Systems & Security (pp. 1-6).https://dl.acm.org/doi/10.1145/3386723.3387875
- Kebande, V. R., Ikuesan, R. A., Karie, N. M., Alawadi, S., Choo, K. K. R., & Al-Dhaqm, A. (2020). Erratum to “Quantifying the need for supervised machine learning in conducting live forensics analysis of emergent configurations (ECO) in IoT environments”[Forensic Sci. Int.: Rep. 2 (2020) 100122]. Forensic Science International: Reports, 2, 100135.https://www.sciencedirect.com/science/article/pii/S2665910720300712
- Kebande, V.R, Alawadi, S., Bugeja, J., A. Persson, J., & Magnus Olsson, C. (2020, October).https://dl.acm.org/doi/abs/10.1145/3423423.3423425
- V.R Kebande, Jan Persson, Sadi Alawadi, Joseph Bugeja(2020) Leveraging Federated Learning & Blockchain to counter Adversarial Attacks in Incremental Learning. In 10th International Conference on the Internet of Things Companion (pp. 1-5).https://dl.acm.org/doi/abs/10.1145/3423423.3423425
- Kebande, Victor R., Stacey O. Baror, Reza M. Parizi, Kim-Kwang Raymond Choo, and H. S. Venter. “Mapping digital forensic application requirement specification to an international standard.” Forensic Science International: Reports 2 (2020): 100137.https://www.sciencedirect.com/science/article/pii/S2665910720300864
- Kebande, V.R., Richard A. Ikuesan, Nickson M. Karie, Sadi Alawadi, Kim-Kwang Raymond Choo, and Arafat Al-Dhaqm. “Quantifying the need for supervised machine learning in conducting live forensic analysis of emergent configurations (ECO) in IoT environments.” Forensic Science International: Reports 2 (2020): 100122.https://www.sciencedirect.com/science/article/pii/S2665910720300712
- Kebande, V.R., Phathutshedzo P. Mudau, Richard A. Ikuesan, H. S. Venter, and Kim-Kwang Raymond Choo. “Holistic digital forensic readiness framework for IoT-enabled organizations.” Forensic Science International: Reports 2 (2020): 100117.https://www.sciencedirect.com/science/article/pii/S2665910720300669
- Al-Dhaqm, A., Razak, S., & Ikuesan, R. A. (2021). Kebande, V.R ,Hajar Othman, S. Face Validation of Database Forensic Investigation Metamodel. Infrastructures 2021, 6, 13.https://www.mdpi.com/2412-3811/6/2/13
2019
- Karie, NM, V.R. Kebande, H s. Venter (2019). Diverging Deep Learning Cognitive Techniques to Computer Forensics. In Forensic Science International: Synergy (2019), Elsevier.https://www.sciencedirect.com/science/article/pii/S2589871X19300737
- Nickson M. Karie, V.R. Kebande, H.S Venter, Kim-Kwang Raymond Choo (2019). On the importance of standardising the process of generating digital forensic reports. In Forensic Science International: Report (2019), Elsevier.https://www.sciencedirect.com/science/article/pii/S2665910719300088
- V.R. Kebande, H s. Venter (2019). CFRaaS: Architectural Design of a Cloud Forensic Readiness as-a Service using NMB Solution as a Forensic Agent. In African Journal of Science, Technology, Innovation and Development (2019), Taylor and Francis.https://journals.co.za/doi/abs/10.1080/20421338.2019.1585675
- V.R. Kebande, H s. Venter (2019). A Comparative Analysis of forensic readiness models using CFRaaS as Baseline. In Wiley Interdisciplinary Reviews (WIRE)-Forensics (2019), Wiley.https://wires.onlinelibrary.wiley.com/doi/epdf/10.1002/wfs2.1350
- V.R. Kebande, (2019). Forensic Intelligence Mining from a Forensically Ready Smart IoT Environment based on Forensic Evidential Beacons. In Forensic Science International: Report (2019), Elsevier.
- V.R. Kebande (2019). On the Security and Privacy of Virtual Sensors in IoT Domain: State of the art, open problems and research directions: Journal of Information Security-Springer.
- V.R Kebande, Jan Persson, Bugeja, T (2019). Internet of Threat Introspection in Dynamic Intelligent Virtual Sensing. In the 9th International Conference on the Internet of Things (IoT 2019) under Cyber-Physical Social Systems for Smart Cities (CPSS2019), in Bilbao, Spain-ACM-published.http://ceur-ws.org/Vol-2530/paper4.pdf
- S. khorashadizadeh, Adeyemi Ikuesan, V.R Kebande, said A (2019). Generic 5G Infrastructure for IoT Ecosystems. In 4th International Conference of Reliable Information and Communication Technology 2019-Springer.https://link.springer.com/chapter/10.1007/978-3-030-33582-3_43
- V.R Kebande, Likhwa Mlotshwa (2019). Botnet’s Obfuscated C&C Infrastructure Take-down Approaches Based on Monitoring Centralized Zeus Bot Variant’s Propagation Model. IST-Africa Proceedings, 2019-IEEE Xplore, Nairobi, Kenya-Published.https://ieeexplore.ieee.org/document/8764837
- V.R Kebande, Taurai H, H.S Venter (2019). Scenario-Based Digital Forensic Investigation of MySQL database. IST-Africa Proceedings, 2019-IEEE Xplore.https://ieeexplore.ieee.org/document/8764819
- V.R Kebande, Nickson M.Karie, KK.Choo (2019). Digital Forensic Readiness Intelligence Repository. In Journal of Security, Digital Forensics and Law. https://onlinelibrary.wiley.com/doi/full/10.1002/spy2.151
- V.R Kebande, Nickson M.Karie, H. S. Venter, Ruth D. Wario (2019). Blockchain Forensics: Issues and Challenges and a Proposal of High-level Solutions. Next Generation Computing Conference (NextGen2019)., 2019-IEEE Xplore, Mauritius.
2018
- V R. Kebande and H. S. Venter (2018). On digital forensic readiness in the cloud using a distributed agent-based solution: issues and challenges. Australian Journal of Forensic Sciences 50.2 (2018): 209-238.https://www.tandfonline.com/doi/abs/10.1080/00450618.2016.1194473
- V. R. Kebande & Nickson M. Karie, (2018). Functional Requirements for Adding Digital Forensic Readiness as a Security Component in IoT Environments. Scorpus, IJASEIT. Vol. 8 No. 1. February-2018, Pages 48-60.
- V. R. Kebande & Nickson M. Karie, (2017). Adding Digital Forensic Readiness as a Security Component to the IoT Domain. Scorpus, IJASEIT. Vol. 8 No. 1. Feb-2018, Pages 48-60.
- Nickson M. Karie & V. R. Kebande (2018). Knowledge Management as a Strategic Asset in Digital Forensic Investigations. International Journal of Cyber-Security and Digital Forensics (IJCSDF) Vol. 7 No.1, January -2018, Pages 10-20.
- V.R Kebande, Nickson M.Karie, I. Kigwana, H. S. Venter (2018). A UML-Based Approach for Analysing Potential Digital Forensic Evidence. International Journal of Cyber-Security and Digital Forensics (IJCSDF) Vol. 7 No.4.
- V.R Kebande, Nickson M.Karie, I. Kigwana, H. S. Venter, Ruth D. Wario (2018). CVSS Metric-Based Analysis, Classification and Assessment of Computer Network Threats and Vulnerabilities. icABCD 2018 Conference Proceedings. The International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD 2018), 2018-IEEE Xplore, Durban, South Africa.
- V. R Kebande, Nickson M.Karie, Antonia Michel, S.Malapane,I. Kigwana, H. S. Venter, Ruth D. Wario (2018). Towards an Integrated Digital Forensic Investigation Framework for an IoT-Based Ecosystem.2018 IEEE International Conference on Smart Internet of Things (IEEE SmartIoT 2018) held on 17th-19th, August 2018 at Xi`an, Shaanxi, China.
- V.R Kebande, Nickson M.Karie, H. S. Venter, Ruth D. Wario (2018). Forensic Profiling of Cyber-Security adversaries based on Incident similarity measures Interaction Index 2018 International Conference on Intelligent and Innovative Computing Applications, 2018-IEEE Xplore, Port Louis, Mauritius.
2017
- Kebande, V. R, and Hein S. Venter. “Novel digital forensic readiness technique in the cloud environment.” Australian Journal of Forensic Sciences (2017): 1-40. Taylor and Francis publisher.
- Lindiwe M. Maake, V. R. Kebande, Nickson M. Karie (2017). Onto-Engineering: A Conceptual framework for Integrating Requirement Engineering Process with scientifically tuned Digital Forensics Ontologies. International Journal of Cyber-Security and Digital Forensics (IJCSDF) Vol. 6, No. 2, Jun – 2017, Pages:73-83.
- V. R. Kebande, Nickson M. Karie & H.S. Venter, (2017). Cloud-Centric framework for isolating Big Data as Forensic Evidence from IoT Infrastructures. In the Proceedings of, the Next Generation Computing Applications 2017 conference (NextComp2017). July 19-21, 2018-IEEE Xplore, Mauritius
- V.R. Kebande, Nickson M. Karie, A. Michael, S.M.G. Malapane & H.S. Venter (2017). How an IoT -enabled “Smart Refrigerator” can play a Clandestine Role in Perpetuating Cyber-crime. IST-Africa 2017 Conference Proceedings. International Information Management Corporation. ISBN: 978-1-905824-54-0. 2018-IEEE Xplore Windhoek, Namibia.
- Nickson M. Karie, V. R. Kebande & H.S. Venter, (2017). Taxonomy for Digital Forensic Evidence. In the proceedings of the pan African Conference on Science Computing and Telecommunications (PACT-2017), Nairobi, Kenya.
- I. Kigwana, V.R. Kebande, H. S. Venter (2017). A Proposed Digital Forensic Investigation Framework for an e-Government for Uganda. IST Africa, 2017-IEEE Xplore.
- I. Kigwana, V.R. Kebande, H. S. Venter (2017). Towards an eGovernment Framework for the Republic of Uganda. IST Africa, 2017-IEEE Xplore.
2016
- V. R. Kebande & Nickson M. Karie, (2016). An Approach for Estimating Forensic Data Provenance of an Object in the Cloud Environment using One Dimensional Successive Bisection Method. International Journal of Computer Applications. Vol.140/No.1 pp. 34-39 (ISBN: 973-93-80891-77-9)
- V. R. Kebande, Nickson M. Karie & Stacey Omeleze (2016). A Mobile Forensic Readiness Model aimed at Minimizing Cyber Bullying. International Journal of Computer Applications. Vol.140/No.1 pp. 28-33 (ISBN: 973-93-80891-77-9)
- Nickson M. Karie & V. R. Kebande (2016). Building Ontologies for Digital Forensic Terminologies. International Journal of Cyber-Security and Digital Forensics (IJCSDF) Vol. 4, No. 2: 498-507. (ISSN: 2305-0012)
- V.R. Kebande, Indrakshi Ray (2016). A Digital Forensic Investigation Framework for Internet of Things (IoT). Presented in the FiCloud 2016: The IEEE 4th International Conference on Future Internet of Things and Cloud, 2018-IEEE Xplore, Vienna, Austria.
- Nickson M. Karie, V. R. Kebande & H.S. Venter, (2016). A Generic Framework for Digital Evidence Traceability. In the proceedings of the 15th European Conference on Cyber Warfare and Security (ECCWS-2016), Munich, Germany.
- V. R. Kebande, Nickson M. Karie & H.S. Venter, (2016). A Generic Digital Forensic Readiness Model for BYOD using Honeypot Technology. IST-Africa 2016 Conference Proceedings. International Information Management Corporation. ISBN: 978-1-905824-54-02018-IEEE Xplore. Durban, South Africa.
- V.R, Kebande, H.S.Venter (2016), “Requirements for Achieving Digital Forensic Readiness in the Cloud Environment using an NMB Solution”- Presented at the 11th International Conference on Cyber Warfare and Security (ICCWS 2016), 17 – 18 Mar 2016, Boston, United States of America.
- V.R. Kebande, H.S.Venter, Hermann Stephane Ntsamo (2016), “Towards a prototype for Achieving Digital Forensic Readiness in the Cloud using a Distributed NMB Solution”- Presented at 15th European Conference on Cyber Warfare and Security (ECCWS 2016), 7th – 8th July 2016, Munich, Bundeswehr University, Germany.
2015
- V. R. Kebande and Nickson M. Karie, (2015). A Framework for Integrating Multimodal Biometrics with Digital Forensics. International Journal of Cyber-Security and Digital Forensics (IJCSDF) Vol. 4, No. 4: 498-507. (ISSN: 2305-0012)
- V.R. Kebande and H.S. Venter (2015). ”Adding Event Reconstruction to a Cloud Forensic Readiness Model”, To be presented in In ISSA 2015-The Proceedings of the 14th International Information Security South Africa Conference-2015, August to 13 August 2015. 2018-IEEE Xplore On Bath, Rosebank, Johannesburg,
- V.R. Kebande and H Venter (2015),” Obfuscating a Cloud-Based Botnet Towards Digital Forensic Readiness”. In Iccws 2015-The Proceedings of the 10th International Conference on Cyber Warfare and Security (p. 434), February 2015. Academic Conferences Limited, Kruger, South Africa.
- V.R. Kebande, H.S.Venter (2015). Towards a Model for Characterizing Potential Digital Evidence in the Cloud Environment during Digital Forensic Readiness Process. Presented at The Third International Conference on Cloud Security and Management, (ICCSM2015), October 21st-24th October 2015. University of Washington, Tacoma, USA.
- V.R. Kebande and H.S. Venter (2015). ”A Functional Architecture for a Cloud Forensic Readiness Large-scale Potential Digital Evidence Analysis”. In Eccws 2015-The Proceedings of the 14th European Conference on Cyber Warfare and Security July 2015, University of Hertfordshire, Hatfield, United Kingdom(UK). Academic Conferences Limited.
2014
- V.R. Kebande, H.S.Venter (2014). A cognitive Approach for Botnet Detection Using Artificial Immune System in the Cloud. Presented at The Third International Conference on Cyber Security, Cyber Warfare and Digital Forensics (CyberSec2014), April 29th-1st May 2014, IEEE Xplore, Lebanese University, Beirut, Lebanon.
- V.R.Kebande, H.S.Venter (2014). A Cloud Forensic Readiness Model Using a Botnet as a service. Presented at The International conference on Digital Security and Forensics (DigitalSec2014). June 24-june 26, Technical University, Ostrava, Czech Republic.