- Padayachee K. 2002. An interpretive Study of Software Risk Management Perspectives, In: SAICSIT 2002: Enablement Through Technology: A Volume in the ACM International Conference Proceedings Series, edited by P Kotzé, J Barrow, L Venter, pages 118-127
- Padayachee K. & Eloff J.H.P. 2006. The Next Challenge: Aspect-Oriented Programming, In: The Sixth IASTED International Conference on MODELLING, SIMULATION, AND OPTIMIZATION (MSO 2006) ACTA Press, Gaborone, Botswana, 11-13 September 2006, pages 123-127
- Padayachee, K. & Eloff J.H.P. 2006. Aspect-Oriented Implementation of e-Consent to foster Trust, In: SAICSIT 2006: Service-oriented software and Systems, Cape Town, South Africa, 9 - 11 October 2006, pages 164-169
- Padayachee, K. & Eloff, J.H.P. 2006. An Aspect-Oriented Model to Monitor Misuse, International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, In: Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, Springer (Netherlands), pages 273 -278, December 2006
- Padayachee, K. & Eloff, J.H.P. 2007. An Aspect-Oriented Approach to Enhancing Multilevel Security with Usage Control: An Experience Report, In: IAGENG: Lecture Notes in Engineering and Computer Science Volume 1 - International, Conference on Software Engineering (ICSE'07), Hong Kong, 21 - 23 March 2007, Hong Kong: Newswood Ltd. International Association of Engineers (Hong Kong), pages 1060 – 1065
- Padayachee, K. 2007. Instrumentation of AspectJ Programs: An Exploratory Study, In: IAGENG: Lecture Notes in Engineering and Computer Science Volume 1 - International, Conference on Software Engineering (ICSE'07), Hong Kong, 21 - 23 March 2007, Hong Kong: Newswood Ltd. International Association of Engineers (Hong Kong), pages 1077 -1081
- Padayachee, K. 2009. Aspect-Oriented Code Obfuscation, In: Proceedings of the 2009 International Conference on Software Technology and Engineering (ICSTE 2009), Chennai, India, 27-29 June 2009, pages 252-257
- Padayachee K. 2011. Teaching safe and secure usage of ICT: A South African Perspective, Proceedings of the 2nd International Conference on Society and Information Technologies (ICSIT 2011), Orlando, USA, 27-30 March 2011, pages 18-21 [ISBN-13: 978-1-936338-18-4]
- Padayachee, K. 2013. A conceptual opportunity-based framework to mitigate the insider threat, Information Security for South Africa (ISSA), Johannesburg, South Africa, pages 1-8
- Kritzinger, E. & Padayachee, K. 2013. Engendering and e-safety awareness culture within the South African context, Africon2013, Mauritius [ISBN: 978-1-4673-5940-5], pages 839-843
- Kandira, M., Mtsweni, J. & Padayachee, K. 2013. Cloud Security and Compliance Concerns: Demystifying stakeholders' roles and responsibilities, The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), December 9-12, 2013, London, UK
- Padayachee, K. 2014. A Rational Choice Theory Perspective of Deploying Honeypots to contain the Insider Threat, The 18th World Multi-Conference on Systemics, Cybernetics and Informatics: WMSCI 2014, Orlando, Florida, July 15 - 18, 2014.
- Gouws, P.M., Padayachee K. and Kritzinger, E. 2014. Towards monitoring the use of Information and Communication Technology in Inspired Science, Engineering and Technology Community Engagement, ISTE Kruger National Park, 19 - 23 October 2014.
- Padayachee, K. 2015. A Framework of Opportunity-Reducing Techniques to Mitigate the Insider Threat: Towards Best Practice, Information Security for South Africa (ISSA), Johannesburg, South Africa (accepted – to be published in the proceedings).
- Gudo, M. and Padayachee, K. 2015. SpotMal: A hybrid malware detection framework with privacy protection for BYOD, In: Proceedings of the 2015 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists (SAICIST 2015), pages 1-6, Stellenbosch, South Africa, 28-30 September 2015 [978-1-4503-3683-3]
- Campbell, R. M. Padayachee, K. and Masombuka, T. 2015. A survey of honeypot research: Trends and opportunities, In 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pages 208-212, London, 14-16 December 2015
- Mekonnen, S., Padayachee, K. and Meshesha, M. 2015. A Privacy Preserving Context-Aware Insider Threat Prediction and Prevention Model Predicated on the Components of the Fraud Diamond, In 2015 Annual Global Online Conference on Information and Computer Technology, pages 60-65, Virtual Conference, 4-6 November 2015
- Padayachee, K., Gouws, P.M. and Lemmer, M. 2015. Evualating the Effectiveness of Logo Robots in Engaged Scholarship, In 2015 Annual Global Online Conference on Information and Computer Technology, pages 16 - 20, Virtual Conference, 4-6 November 2015
- Padayachee, K. and Mbati, L. 2016. A Guiding Vision of Technology-Enabled Active Learning A South African Perspective, 2016 Annual Global Online Conference on Information and Computer Technology (GOCICT), Virtual Conference, 16-18 November 2016
- Padayachee, K. 2016. A Stepwise Framework towards ICT Integration in Education: A South African Perspective, 3rd IEEE International Conference on Advances in Computing, Communication and Engineering, Durban, South Africa, 28-29 November 2016.