HS Venter
HS Venter
Professor of Computer Science, University of Pretoria
Bestätigte E-Mail-Adresse bei cs.up.ac.za
Titel
Zitiert von
Zitiert von
Jahr
A taxonomy for information security technologies
HS Venter, JHP Eloff
Computers & Security 22 (4), 299-307, 2003
1492003
Social engineering attack examples, templates and scenarios
F Mouton, L Leenen, HS Venter
Computers & Security 59, 186-209, 2016
1322016
An approach to implement a network intrusion detection system using genetic algorithms
MM Pillai, JHP Eloff, HS Venter
Proceedings of the 2004 annual research conference of the South African …, 2004
1002004
Social engineering attack framework
F Mouton, MM Malan, L Leenen, HS Venter
2014 Information Security for South Africa, 1-9, 2014
762014
Exploring forensic data with self-organizing maps
B Fei, J Eloff, H Venter, M Olivier
Ifip international conference on digital forensics, 113-123, 2005
712005
Exploring forensic data with self-organizing maps
B Fei, J Eloff, H Venter, M Olivier
Ifip international conference on digital forensics, 113-123, 2005
712005
Harmonised digital forensic investigation process model
A Valjarevic, HS Venter
2012 Information Security for South Africa, 1-10, 2012
672012
Social engineering attack detection model: Seadm
M Bezuidenhout, F Mouton, HS Venter
2010 Information Security for South Africa, 1-8, 2010
662010
Towards an ontological model defining the social engineering domain
F Mouton, L Leenen, MM Malan, HS Venter
IFIP International Conference on Human Choice and Computers, 266-279, 2014
612014
Taxonomy of challenges for digital forensics
NM Karie, HS Venter
Journal of forensic sciences 60 (4), 885-893, 2015
552015
The use of self-organising maps for anomalous behaviour detection in a digital investigation
BKL Fei, JHP Eloff, MS Olivier, HS Venter
Forensic Science International 162 (1-3), 33-37, 2006
542006
Necessity for ethics in social engineering research
F Mouton, MM Malan, KK Kimppa, HS Venter
Computers & Security 55, 114-127, 2015
512015
A cloud forensic readiness model using a Botnet as a Service
VR Kebande, HS Venter
The international conference on digital security and forensics …, 2014
452014
Digital forensic framework for a cloud environment
G Sibiya, HS Venter, T Fogwill
International Information Management Corporation (IIMC), 2012
452012
Using time-driven activity-based costing to manage digital forensic readiness in large organisations
K Reddy, HS Venter, MS Olivier
Information Systems Frontiers 14 (5), 1061-1077, 2012
432012
The architecture of a digital forensic readiness management system
K Reddy, HS Venter
Computers & security 32, 73-89, 2013
422013
A comprehensive and harmonized digital forensic investigation process model
A Valjarevic, HS Venter
Journal of forensic sciences 60 (6), 1467-1483, 2015
402015
Mobile botnet detection using network forensics
I Vural, H Venter
Future Internet Symposium, 57-67, 2010
392010
Digital forensic readiness in the cloud
PM Trenwith, HS Venter
2013 Information Security for South Africa, 1-5, 2013
382013
An Investigation Into Computer Forensic Tools.
KK Arthur, HS Venter
ISSA, 1-11, 2004
332004
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20