HS Venter
HS Venter
Professor of Computer Science, University of Pretoria
Vahvistettu sähköpostiosoite verkkotunnuksessa cs.up.ac.za
NimikeViittauksetVuosi
A taxonomy for information security technologies
HS Venter, JHP Eloff
Computers & Security 22 (4), 299-307, 2003
1402003
An approach to implement a network intrusion detection system using genetic algorithms
MM Pillai, JHP Eloff, HS Venter
Proceedings of the 2004 annual research conference of the South African …, 2004
972004
Social engineering attack examples, templates and scenarios
F Mouton, L Leenen, HS Venter
Computers & Security 59, 186-209, 2016
932016
Exploring forensic data with self-organizing maps
B Fei, J Eloff, H Venter, M Olivier
Ifip international conference on digital forensics, 113-123, 2005
662005
Exploring forensic data with self-organizing maps
B Fei, J Eloff, H Venter, M Olivier
Ifip international conference on digital forensics, 113-123, 2005
662005
Social engineering attack framework
F Mouton, MM Malan, L Leenen, HS Venter
2014 Information Security for South Africa, 1-9, 2014
602014
Social engineering attack detection model: Seadm
M Bezuidenhout, F Mouton, HS Venter
2010 Information Security for South Africa, 1-8, 2010
592010
Harmonised digital forensic investigation process model
A Valjarevic, HS Venter
2012 Information Security for South Africa, 1-10, 2012
562012
The use of self-organising maps for anomalous behaviour detection in a digital investigation
BKL Fei, JHP Eloff, MS Olivier, HS Venter
Forensic Science International 162 (1-3), 33-37, 2006
522006
Towards an ontological model defining the social engineering domain
F Mouton, L Leenen, MM Malan, HS Venter
IFIP International Conference on Human Choice and Computers, 266-279, 2014
472014
Necessity for ethics in social engineering research
F Mouton, MM Malan, KK Kimppa, HS Venter
Computers & Security 55, 114-127, 2015
432015
Digital forensic framework for a cloud environment
G Sibiya, HS Venter, T Fogwill
International Information Management Corporation (IIMC), 2012
432012
Using time-driven activity-based costing to manage digital forensic readiness in large organisations
K Reddy, HS Venter, MS Olivier
Information Systems Frontiers 14 (5), 1061-1077, 2012
412012
Taxonomy of challenges for digital forensics
NM Karie, HS Venter
Journal of forensic sciences 60 (4), 885-893, 2015
392015
The architecture of a digital forensic readiness management system
K Reddy, HS Venter
Computers & security 32, 73-89, 2013
392013
A cloud forensic readiness model using a Botnet as a Service
VR Kebande, HS Venter
The international conference on digital security and forensics …, 2014
382014
Mobile botnet detection using network forensics
I Vural, H Venter
Future Internet Symposium, 57-67, 2010
382010
Digital forensic readiness in the cloud
PM Trenwith, HS Venter
2013 Information Security for South Africa, 1-5, 2013
352013
A comprehensive and harmonized digital forensic investigation process model
A Valjarevic, HS Venter
Journal of forensic sciences 60 (6), 1467-1483, 2015
322015
An Investigation Into Computer Forensic Tools.
KK Arthur, HS Venter
ISSA, 1-11, 2004
312004
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20