Renier van Heerden
Renier van Heerden
CSIR, Pretoria
Bestätigte E-Mail-Adresse bei csir.co.za
Titel
Zitiert von
Zitiert von
Jahr
Classifying network attack scenarios using an ontology
RP van Heerden, B Irwin, I Burke
Proceedings of the 7th International Conference on Information-Warfare …, 2012
282012
Automatic number plate segmentation and recognition
C Nieuwoudt, R Van Heerden
Seventh annual South African workshop on Pattern Recognition, 88-93, 1996
251996
Formal comments on the integrated resource plan (IRP) update assumptions, base case and observations 2016
JG Wright, JR Calitz, PR Van Heerden, ST Bischof-Niemz, C Mushwana, ...
222017
A computer network attack taxonomy and ontology
RP Van Heerden, B Irwin, ID Burke, L Leenen
International Journal of Cyber Warfare and Terrorism (IJCWT) 2 (3), 12-25, 2012
202012
Comparing Models of Offensive Cyber Operations
T Grant, I Burke, R van Heerden
Proceedings of the 7th International Warfare and Security, 108-121, 2012
152012
Optimization of vehicle license plate segmentation and symbol recognition
RP Van Heerden, EC Botha
Department of Electrical, Electronic and Computer Engineering, University of …, 2010
142010
Optimization of vehicle license plate segmentation and symbol recognition
BEC van Heerden, R.P.
Twelfth Annual Symposium of the South African Pattern Recognition Association, 2001
14*2001
Formal comments on the Integrated Resource Plan (IRP) update assumptions, base case and observations
J Wright, T Bischof-Niemz, C Calitz, C Mushwana, R van Heerden, ...
Council for Scientific and Industrial Research, Pretoria, 2017
132017
System inertia and Rate of Change of Frequency (RoCoF) with increasing non-synchronous renewable energy penetration
GA Chown, JG Wright, RP Van Heerden, M Coker
132017
Automated classification of computer network attacks
R van Heerden, L Leenen, B Irwin
2013 International Conference on Adaptive Science and Technology, 1-7, 2013
132013
Classification of cyber attacks in South Africa
R Van Heerden, S Von Soms, R Mooi
2016 IST-Africa Week Conference, 1-16, 2016
102016
Reference architecture for android applications to support the detection of manipulated evidence
H Pieterse, MS Olivier, RP Van Heerden
SAIEE Africa Research Journal 107 (2), 92-103, 2016
92016
Playing hide-and-seek: Detecting the manipulation of Android Timestamps
H Pieterse, MS Olivier, RP van Heerden
Information Security for South Africa (ISSA), 2015
92015
Presentation: Formal comments on the Integrated Resource Plan (IRP) Update Assumptions, Base Case and Observations 2016
JG Wright, T Bischof-Niemz, J Calitz, C Mushwana, R Van Heerden, ...
CSIR, South Africa, Tech. Rep. Power Point Present, 1-337, 2017
72017
Mapping the most significant computer hacking events to a temporal computer attack model
R van Heerden, H Pieterse, B Irwin
IFIP International Conference on Human Choice and Computers, 226-236, 2012
72012
Using an ontology for network attack planning
R van Heerden, P Chan, L Leenen, J Theron
International Journal of Cyber Warfare and Terrorism (IJCWT) 6 (3), 65-78, 2016
62016
Automating cyber offensive operations for cyber challenges
I Burke, RP Van Heerden
11th International Conference on Cyber Warfare and Security, 65-73, 2016
62016
Heuristic Attacks against graphical password generators
S Peach, J Voster, RV Heerden
Proceedings of the South African Information Security Multi-Conference …, 2010
62010
Heuristic Attacks against graphical password generators
S Peach, J Voster, RV Heerden
Proceedings of the South African Information Security Multi-Conference …, 2010
62010
A Statistical Analysis of Large Passwords Lists, Used to Optimize Brute Force Attacks
R van Heerden, J Vorster
The 4th International Conference on i-Warfare & Security, 111-127, 2009
62009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20