Francois Mouton
Francois Mouton
Social-Engineer South Africa
Vahvistettu sähköpostiosoite verkkotunnuksessa noroff.no - Kotisivu
NimikeViittauksetVuosi
Social engineering attack examples, templates and scenarios
F Mouton, L Leenen, HS Venter
Computers & Security 59, 186-209, 2016
932016
Social engineering attack framework
F Mouton, MM Malan, L Leenen, HS Venter
2014 Information Security for South Africa, 1-9, 2014
602014
Social engineering attack detection model: SEADM
M Bezuidenhout, F Mouton, HS Venter
Information Security for South Africa (ISSA), 1-8, 2010
592010
Towards an ontological model defining the social engineering domain
F Mouton, L Leenen, MM Malan, HS Venter
IFIP International Conference on Human Choice and Computers, 266-279, 2014
472014
Necessity for ethics in social engineering research
F Mouton, MM Malan, KK Kimppa, HS Venter
Computers & Security 55, 114-127, 2015
432015
A prototype for achieving digital forensic readiness on wireless sensor networks
F Mouton, HS Venter
AFRICON, 1-6, 2011
262011
Social engineering attack detection model: Seadmv2
F Mouton, L Leenen, HS Venter
2015 International Conference on Cyberworlds (CW), 216-223, 2015
212015
Social engineering from a normative ethics perspective
F Mouton, MM Malan, HS Venter
Information Security for South Africa (ISSA), 1-8, 2013
182013
Development of cognitive functioning psychological measures for the SEADM
F Mouton, MM Malan, HS Venter
Information Security for South Africa (ISSA), 1-12, 2012
152012
Benchmarking a mobile implementation of the social engineering prevention training tool
F Mouton, M Teixeira, T Meyer
Information Security for South Africa (ISSA), 2017, 106-116, 2017
82017
Web Defacement and Intrusion Monitoring Tool: WDIMT
M Masango, F Mouton, P Antony, B Mangoale
2017 International Conference on Cyberworlds (CW), 72-79, 2017
62017
Requirements for wireless sensor networks in order to achieve digital forensic readiness
F Mouton, HS Venter
6th International Workshop on Digital Forensics and Incident Analysis (WDFIA …, 2011
62011
Finite state machine for the social engineering attack detection model: SEADM
F Mouton, A Nottingham, L Leenen, HS Venter
SAIEE Africa Research Journal 109 (2), 133-148, 2018
52018
Underlying finite state machine for the social engineering attack detection model
F Mouton, A Nottingham, L Leenen, HS Venter
Information Security for South Africa (ISSA), 2017, 98-105, 2017
52017
A Secure Communication Protocol for Wireless Sensor Networks
F Mouton, HS Venter
Proceedings of the Annual Security Conference "Security Assurance and …, 2009
42009
Context aware mobile application for mobile devices
M Masango, F Mouton, A Nottingham, J Mtsweni
2016 Information Security for South Africa (ISSA), 85-90, 2016
32016
System dynamics modelling to investigate the cost-benefit of cyber security investment
R Oosthuizen, MM Molekoa, F Mouton
12018
An Approach for Detecting Web Defacement with Self-healing Capabilities
M Masango, F Mouton, P Antony, B Mangoale
Transactions on Computational Science XXXII, 29-42, 2018
12018
An Investigation of the Current State of Mobile Device Management Within South Africa
ID Burke, F Mouton
8th International Conference on Information Warfare and Security, 24-34, 2013
12013
Cyber security investment cost-benefit investigation using system dynamics modelling
R Oosthuizen, L Pretorius, F Mouton, M Molekoa
ICCWS 2019 14th International Conference on Cyber Warfare and Security …, 2019
2019
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20