2025
Pelser H., Coetzee M. (2025), Profiling Prominent Ransomware Threat Actors, ISSA 2024: 23rd International Information Security South Africa Conference, Boardwalk International Convention Centre, Gqeberha, South Africa, December 2-3, 2024
Leotlela B., Ledwaba L., and Coetzee M. (2025), Trust Requirements and Mechanisms in Peer-to-Peer Energy Markets, ISSA 2024: 23rd International Information Security South Africa Conference, Boardwalk International Convention Centre, Gqeberha, South Africa, December 2-3, 2024
Jacobs, C. J. and Coetzee, M. (2025), Countering mobile application threats through a structured threat modelling approach, ISSA 2024: 23rd International Information Security South Africa Conference, Boardwalk International Convention Centre, Gqeberha, South Africa, December 2-3, 2024
Leotlela B., Ledwaba L., and Coetzee M. (2025), Evaluating Trust Models for the IoT-enabled, Peer-to-Peer Energy Market. Proceedings of the Foundational Digital Capabilities Research (FDCR) Conference 2025, 17-18 July, Durban, pg. 34, ISBN-10: 0-7988-5673-4
Murisa, W. and Coetzee, M. (2025), A Conceptual SOC Framework for Air Traffic Management Systems, In Proceedings of the 11th International Conference on Information Systems Security and Privacy (ICISSP 2025), 20 Feb 2025, Volume 1, pages 275-282, ISBN: 978-989-758-735-1; ISSN: 2184-4356, DOI: 10.5220/0013174200003899
2024
Murisa, W., Coetzee, M. (2024, March). Strengthening Aviation Cybersecurity with Security Operations Centres. In International Conference on Cyber Warfare and Security, Vol. 19, No. 1, pp. 481-489.
Lubbe, H., Serfontein, R. and Coetzee, M. (2024), March. Assessing the Effectiveness of ADS-B Mitigations. In International Conference on Cyber Warfare and Security, Vol. 19, No. 1, pp. 535-544.
Leotlela, B. and Coetzee, M., (2024), Digital Twin Monitoring of Classes and Students. In 2024 IST-Africa Conference (IST-Africa), pp. 1-8, IEEE.
2023
Coetzee, M. and Goede, R., (2023), A critical systems approach to conference organisation. Journal of the International Society for the Systems Sciences, 67.
Lubbe H., Serfontein R., Coetzee M. (2023), A review of the security state of ADS-B: Threats and Mitigations, THREAT 2023 Proceedings by Cybersecurity Institute Africa (PTY) Ltd, 20-21 Nov 2023, Stellenbosch, ISBN: 978-0-6397-8483-2
Lekota F., Coetzee M. (2023), Enhancing Cybersecurity Incident Response and Resilience for South Africa's Critical Infrastructure, THREAT 2023 Proceedings by Cybersecurity Institute Africa (PTY) Ltd, 20-21 Nov 2023, Stellenbosch, ISBN: 978-0-6397-8483-2
Jacobs, C. J. and Coetzee, M. (2023) Drivers for a Secure Mobile App Development Framework, In Proceedings of the 2023 The Seventeenth International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2023, September 25 - 29, 2023 Porto, Portugal, ISBN: 978-1-68558-092-6
Muller J., Coetzee M. (2023), A Minimum Viable Automated Assistant Architecture for ICT Project-Based Assessments, 52nd Annual Conference of the Southern African Computer Lecturers' Association SACLA 2023, Muldersdrift, South Africa, 17 – 19 July, ISBN: 978-0-6397-8221-8 (Electronic) <https://sacla2023.com/proceedings>
2022
Greaves B., Coetzee M., Leung W.S. (2022) Digital Twin Monitoring for Cyber-Physical Access Control. In: Meng W., Katsikas S.K. (eds) Emerging Information Security and Applications. EISA 2021. Communications in Computer and Information Science, vol 1403. Springer, Cham.
Greaves B., Coetzee M., Leung W.S. (2022) Access Control in Cyber-Physical Spaces Using Virtual Perimeters. In: Yang XS., Sherratt S., Dey N., Joshi A. (eds) Proceedings of Sixth International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems, vol 216. Springer, Singapore.
2021
Marais S., Coetzee M., Blauw F. 2021, Simultaneous Deauthentication of Equals Attack. In: Wang G., Chen B., Li W., Di Pietro R., Yan X., Han H. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2020. Lecture Notes in Computer Science, vol 12383. Springer, Cham.
Lekota F, Coetzee M, 2021, Aviation sector computer security incident response teams: guidelines and best practice, ECCWS 2021, 20th European Conference on Cyber Warfare and Security 24th - 25th June 2021
2020
Julius K and Coetzee M. 2020. DroidSecAware: Android security awareness support. In Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications (ICONIC '20). Association for Computing Machinery, New York, NY, USA, Article 43, 1–6.
Archary, D. and Coetzee, M., 2020, August. Predicting Stock Price Movement with Social Media and Deep Learning. In 2020 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD) (pp. 1-5). IEEE.
Nkuna, G. and Coetzee, M., 2020, August. Social Event Invitation and Recommendation for Event based Social Networks. In 2020 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD) (pp. 1-5). IEEE.
Greaves, B., Coetzee, M. and Leung, W.S., 2020. A Comparison of Indoor Positioning Systems for Access Control Using Virtual Perimeters. In Fourth International Congress on Information and Communication Technology (pp. 293-302). Springer, AISC, volume 104, Singapore.
Lekota, F and Coetzee, M, An Aviation Sector CSIRT for Sub-Saharan Africa, Information and Cyber Security, 2020, CCIS (Communications in Computer and Information Science), volume 1166, Springer International Publishing, Cham, pp 28-42
2019
Greaves B., Coetzee M., Leung W.S. (2019) A Comparison of Indoor Positioning Systems for Access Control Using Virtual Perimeters. In: Yang XS., Sherratt S., Dey N., Joshi A. (eds) Fourth International Congress on Information and Communication Technology, ICICT 2019, London, UK, Advances in Intelligent Systems and Computing, pp 293-302, vol 1041, Springer, Singapore.
Lekota, F. and Coetzee, M. (2019) Cybersecurity Incident Response for the Sub-Saharan African Aviation Industry. In International Conference on Cyber Warfare and Security (pp. 536-XII). Stellenbosch, South Africa, Academic Conferences International Limited.
Nkomo P., Coetzee M. (2019) Software Development Activities for Secure Microservices. In: Misra S. et al. (eds) Computational Science and Its Applications, ICCSA 2019, St Petersburg, Russia, pp 573--585, Lecture Notes in Computer Science, vol 11623. Springer, Cham
Nkomo P., Coetzee M. (2019) Development Activities, Tools and Techniques of Secure Microservices Compositions. In: Heng SH., Lopez J. (eds) Information Security Practice and Experience. ISPEC 2019, Kuala Lumpur, Malaysia, pp 423-433, Lecture Notes in Computer Science, vol 11879. Springer, Cham
2018
Khanyile L C, Coetzee M, (2018), Collaboration Circles: empowering job seekers to find work using ad-hoc collaboration networks, The African Journal of Information Systems, In press
Damon F, Coetzee M, (2018), The Design of an Identity and Access Management Assurance Dashboard Model, 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018
Greaves B, Coetzee M, Leung W S (2018), Access Control Requirements for Physical Spaces Protected by Virtual Perimeters, 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018
Damon F, Coetzee M, (2018), Evaluation of Identity and Access Assurance Component Model Dimensions, International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD 2018), Durban South Africa, 6-7 Aug, ISBN: 978-1-5386-3060-0
Kaboba Y, Coetzee M, (2018), Selective Mobile Cloud Offloading Decisions, IST-Africa 2018 Conference Proceedings, Gaborone, ISBN: 978-1-905824-59-5
Phahlamohlaka M C and Coetzee M, (2018) CaseRank: Ranking case law using precedent and principal component analysis, Conference on Information Communications Technology and Society (ICTAS), Durban, 2018, pp. 1-6.
2017
Greaves, B. and Coetzee, M., 2017. Access control for secure information sharing in smart content spaces. Journal of Information Security and Applications, Vol 34 (1), June 2017, pp 63-75
Greaves B., Coetzee M., Leung W. S., 2017, Requirements for stereovision-based access control for physical spaces, In Proceedings of the IST-Africa 2017 Conference, 31 May - 2 June, Windhoek, Namibia, ISBN: 978-1-905824-56-4
Khanyile T., Coetzee M., (2017), Collaboration Circles: finding experts to team with, In proceedings of the African Conference on Information Systems and Technology (ACIST) 2017, 10 – 12 July, Cape Town, South Africa
2016
Nkomo, P. T. and Coetzee, M. (2016) Engineering Secure Adaptable Web Services Compositions, In Proceedings of the 2016 International Conference on Information Resources Management, CONF-IRM 2016, May 18-20 Cape Town, South Africa, ISBN: 978-0-473-35594-4
Greaves B, Coetzee M (2016), SmartNet: Secure content sharing for peer to peer smart group spaces, In Proceedings of the 11th International Conference on Availability, Reliability and Security, ARES 2016, SOCOTUD workshop, 31 August – 02 September, Salzburg, Austria, ISBN-13: 978-1-5090-0990-9
2015
B Greaves, M Coetzee, Access Control for Local Personal Smart Spaces, In Proceedings of the 11th Annual Information Security for South Africa Conference, ISSA 2013, 12-13 Aug, Johannesburg, South Africa, published by IEEE Computer Society, ISBN 978-1-4799-7754-3
G Smith, M Coetzee, AFA-RFID: Physical Layer Authentication for Passive RFID Tags, In Proceedings of the 11th Annual Information Security for South Africa Conference, ISSA 2013, 12-13 Aug, Johannesburg, South Africa, published by IEEE Computer Society, ISBN 978-1-4799-7754-3
C Hillebrand, M Coetzee, The Design of a Configurable Reputation Service, 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Volume 9264 of the series Lecture Notes in Computer Science pp 60-70, ISBN 978-3-319-22905-8
G Smith, M Coetzee, A Zero-Knowledge Authentication Scheme for Passive RFID Tags using Analogue Fingerprints, to be presented at the Southern Africa Telecommunication Networks and Applications Conference (SATNAC) 2015, 6-9 Setptember, Hermanus, South Africa
2014
C Hillebrand, M Coetzee, Moving reputation to the Cloud, SAIEE Africa Research Journal, 2014: Vol 105 No 2 [PDF]
M Coetzee, Access control for Software-as-a-Service applications, presentation at the Cloud Computing Security and Identity Workshop, National Museum of Computing, Bletchley Park, United Kingdom, 3-4 April 2014
D Isherwood, M Coetzee, TrustCV: Reputation-based trust for collectivist digital business ecosystems, accepted for presentation at the 12th annual International Conference on Privacy, Security and Trust (PST 2014), Toronto, Canada, July 23-24, 2014
M M A Chayya, M Coetzee, Enhancing a question-answer medical social network with reputation, accepted for presentation at the 6th International Conference on e-Health (EH 2014) 17 – 19 July, Lisbon, Portugal
M Coetzee, Argumentation-based group decision support for collectivist communities, accepted for presentation at the International Cross Domain Conference and Workshop (CD-ARES 2014), University of Fribourg, Switzerland, September 8th – 12th, 2014
2013
M Coetzee, Clarke J, Eloff J, Isherwood D, Chaturvedi M, Sharma M, Boudaoud K, Mekhilef M, Trust Management in Emerging Countries: International Cooperation Research: Challenges for Horizon 2020, BIC International Workshop on Trustworthiness, Accountability and Forensics in the Cloud (TAFC 2013), Malaga, Spain, June 6–7, 2013 [PDF]
C Hillebrand, M Coetzee, Towards Reputation-as-a-Service, In Proceedings of the 9th Annual Information Security for South Africa Conference, ISSA 2013, 14-16 Aug, Johannesburg, South Africa, published by IEEE Computer Society, ISBN 978-1-4799-0808-0
F Damon, M Coetzee, Towards a generic Identity and Access Assurance model by component analysis, accepted for presentation at the First International Conference on Enterprise Systems, ES 2013, Cape Town, South Africa, 7-8 November 2013, ISBN 978-1-4673-6412-6 [PDF]
C van der Westhuizen, M Coetzee, Context-Aware RESTful Services on Mobile Devices, The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), Technically Co-sponsored by IEEE UK/RI Computer Chapter, December 9-12, 2013, London, UK, ISBN 978-1-908320-16-2 [PDF]
C van der Westhuizen, M Coetzee, A Framework for Provisioning RESTful Services on Mobile Devices, 5th International Conference on Adaptive Science and Technology (ICAST 2013), Pretoria, South Africa from 25th - 27th November 2013, ISBN 978-1-4799-3067-8
2012
D. Isherwood, M. Coetzee and J.H.P. Eloff, Towards Trust and Reputation for E-Commerce in Collectivist Rural Africa, International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012), 6-8 June 2012 in Crete, Greece
M Coetzee, Towards a holistic Information Security Governance framework for SOA, accepted for presentation at the 7th ARES conference (ARES 2012), University of Economics in Prague, August 20th - 24th, 2012, Prague, Austria
2011
D Isherwood, M Coetzee, Enhancing Digital Business Ecosystem trust and reputation with centrality measures, ISSA 2011, Johannesburg, 15 - 17 August 2011, ISBN 978-1-4577-1483-2, published by IEEE Computer Society
T Lavarack, M Coetzee, Web Services Security Policy Assertion Trade-offs, Sixth International Conference on Availability, Reliability and Security FARES 2011, Vienna, Austria, 22 - 26 August 201, ISBN 978-0-7695-4485-4, pp 535-540, published by IEEE Computer Society
J Chetty, M Coetzee, Information Security For Service Oriented Computing: Ally Or Antagonist, Sixth International Conference on Availability, Reliability and Security FARES 2011, Vienna, Austria, 22 - 26 August 2011, ISBN 978-0-7695-4485-4, pp 46-=465, published by IEEE Computer Society
D Mallis, M Coetzee, Towards Bluetooth multi-hop messaging, accepted for presentation at AFRICON 2011, Zambia, 13 - 15 September 2011, ISSN: 2153-0025, pp.1-7, published by IEEE Computer Society
J Chetty, M Coetzee, The supportive role of service contract design for service governance, ZA-WWW2011, University Of The Witwatersrand, Johannesburg, 13 – 15 Sept 2011, ISBN: 978-0-620-51918-2
2010
T Lavarack, M Coetzee, A web services security policy assistant, In proceedings of the 5th International Conference for Internet Technology and Secured Transactions (ICITST), November 8-11, 2010, London, UK, ISBN 978-0-9564263-6-9, published by IEEE Computer Society
J Chetty, M Coetzee, Towards an Information Security Framework for Service-oriented Architecture, In Proceedings of the 9th Annual Information Security for South Africa Conference, ISSA2010, 2 - 4 Aug, Johannesburg, South Africa, ISBN 978-1-4244-5493-8, published by IEEE Computer Society
T Lavarack, M Coetzee, Considering web services security policy compatibility, In Proceedings of the 9th Annual Information Security for South Africa Conference, ISSA2010, 2 - 4 Aug, Johannesburg, South Africa, ISBN 978-1-4244-5493-8, published by IEEE Computer Society
2009
M Coetzee, Social access control for mobile-centric social networks, In proceedings of the IADIS International Conference WWW/Internet 2009, 19 – 22 Nov, Rome, Italy, pp 68-75, ISBN 978-972-8924-93-5
J Leonard, M Coetzee, A model for a socially-aware mobile tourist recommendation system, In Proceedings of the 11th annual conference on WWW applications, ZAWWW09, Port Elizabeth, 2-4 Sept 2009, ISBN 978-0-620-45215-1
J Chetty, M Coetzee, Evaluating information security controls applied by Service-Oriented Architecture governance frameworks, In Proceedings of the 8th Annual Information Security for South Africa Conference, ISSA2009, 6 – 8 July, Johannesburg, South Africa, ISBN 978-1-86854-740-1
T Lavarack, M Coetzee, A Framework for Web services security policy negotiation, In Proceedings of the 8th Annual Information Security for South Africa Conference, ISSA2009, 6 – 8 July, Johannesburg, South Africa, ISBN 978-1-86854-740-1
Smith G, Coetzee M, An analysis of authentication for passive RFID tags, In Proceedings of the 8th Annual Information Security for South Africa Conference, ISSA2009, 6 – 8 July, Johannesburg, South Africa, ISBN 978-1-86854-740-1
2008
Smith G, Coetzee M, Analogue Fingerprinting for Passive RFID Tags, In Proceedings of the Third International Conference on Broadband Communications, Information Technology & Biomedical Applications, BROADCOM 2008, pp.156-163, Agbinya, Biermann, Haman, Ntlatlapa, Fergusson (Eds), ISBN 978-0-7695-3453-4, CSIR Convention Centre, 23 - 26 Nov, Pretoria, South Africa
Cahill M, Coetzee M, Wireless technology for the management of behaviour in correctional facilities, Acta Criminologica, pp 78-91, Special edition 2, 2008, ISSN 1012-8093
Markides B, Coetzee M, Trusted information sharing for mobile social networks, In Proceedings of the 2nd IFIP International symposium on Wireless Communications and Information Technology in developing countries, WCTID 2008, A Pont Sanjuan, P S Kritzinger (Eds), ISBN 978-84-612-5570-2, 6—7 October, CSIR, Pretoria, South Africa
Tvrz F, Coetzee M, The Information Security of a Bluetooth-enabled handheld device, In Proceedings of the 7th Annual Information Security for South Africa Conference, ISSA2008, 6 – 9 July, Johannesburg, South Africa, ISBN 978-1-86854-693-0
Chetty J, Coetzee M, Considering contracts for governance in service-oriented architectures, presented at the Annual ISSA (Information Security for South Africa) Conference, research-in-progress track, Johannesburg, South Africa, July 2008
Markides B, Coetzee M, BlueTrust in a Real World, In Proceedings of Third International Conference on Availability, Reliability and Security, ARES 2008, pp. 440-445, Jakoubi S, Tjoa S, Weippl E (Eds), IEEE Computer Society, ISBN: 978-0-7695-3102-1, 4-7 March 2008, Barcelona, Spain
2007
M. Coetzee, J. H. P. Eloff, A trust and context aware access control model for web services conversations, in C Lambrinoudakis, G Pernul, and AM Tjoa (eds), TrustBus07, 4th International Conference on Trust, Privacy & Security in Digital Business, Regensburg, Germany, LNCS 4657
M. Cahill, M. Coetzee, Wireless technology for the management of behaviour in correctional facilities, CRIMSA Conference, 27-29 August 2007, University of Pretoria
M. Coetzee, J. H. P. Eloff, Web services access control architecture incorporating trust, Internet Research, Vol 17 Issue 3, Page 291-305, Emerald Group Publishing Limited
2006
M. Coetzee, PhD Thesis, WSACT - A model for web services access control incorporating trust, September 2006, University of Pretoria
M. Coetzee, J H P Eloff, A Framework for Web Services Trust, 21st IFIP International Information Security Conference "Security and Privacy in Dynamic Environments", 22 - 24 May 2006, Karlstad University, Karlstad, Sweden
2005
M. Coetzee, J. H. P. Eloff, Autonomous trust for Web Services, Internet Research, Vol 15, No 5, 2005, Emerald Group Publishing Limited - see INC2005
M. Coetzee, J. H. P. Eloff, Autonomous trust for Web Services, INC 2005 (The 5th International Network Conference), 5 – 7 July 2005, Samos , Greece
M. Coetzee, J. H. P. Eloff, Metadata for trust in Service-oriented Architectures, ISSA 2005 (Information Security for South Africa), 29 June – 1 July 2005, Sandton, Johannesburg
M. Coetzee, J. H. P. Eloff, An Access Control Framework for Web Services, Information Management and Computer Security, Vol 13, no 1, March 2005, Emerald Group Publishing Limited
2004
M. Coetzee, J. H. P. Eloff, Towards Web Services access control, Computers and Security, Vol. 23 no. 7, Elsevier publishers, UK
M. Coetzee, J. H. P. Eloff, Access control for service-oriented computing, SATNAC 2004 (South African Telecommunications Networks and Applications Conference), 6-8 September 2004, Spier Wine Estate, Stellenbosch.
M. Coetzee, J. H. P. Eloff, Access control for networked Web Services, INC 2004 (The 4th International Network Conference), 6 – 9 July 2004, Plymouth, UK
M. Coetzee, J. H. P. Eloff, A logic-based access control approach for Web Services, ISSA 2004 (Information Security for South Africa), 30 June – 2 July 2004, Gallagher Estate, Midrand
2003
M. Coetzee, J. H. P. Eloff, Secure and available virtual Web database environments, WWW 2003 (5th Annual Conference on World Wide Web Applications), 10-12 September 2003, University of Durban Westville, Durban
M. Coetzee, J. H. P. Eloff, Virtual enterprise access control requirements, SAICSIT 2003 (South African Institute of Computer Scientists and Information Technologists), IT research in developing countries, 17 – 19 September 2003, Indaba Hotel, Fourways.
M. Coetzee, J. H. P. Eloff, Access control for Web Services, ISSA 2003 (Information Security for South Africa), 9-11 July 2003, Sandton
2002
M. Coetzee, J. H. P. Eloff, Secure database connectivity and the WWW, IFIP SEC2002 (The 17th International Conference on Information Security, sponsored by the International Federation for Information Processing - IFIP), 7-9 May 2002, Cairo , Egypt
M. Coetzee, J. H. P. Eloff, Secure database connectivity and the WWW, ISSA 2002 (Information Security for South Africa), 9-11 July 2002, Muldersdrift