Johannes S. Vorster
Zitiert von
Zitiert von
A constraint-based solver for the military unit path finding problem
L Leenen, JS Vorster, H le Roux
Proceedings of the 2010 Spring Simulation Multiconference, 25, 2010
Heuristic Attacks against graphical password generators
S Peach, JS Vorster, RP Van Heerden
Proceedings of the South African Information Security Multi-Conference …, 2010
Statistical analysis of large passwords lists, used to optimize brute force attacks
RP Van Heerden, JS Vorster
Proceedings of the 4th International Conference On Information Warfare and …, 2009
Using Markov Models to crack passwords
RP van Heerden, JS Vorster
The 3rd International Conference on Information Warfare and Security: Peter …, 2008
Major security incidents since 2014: An African perspective
R Van Heerden, S Von Solms, J Vorster
2018 IST-Africa Week Conference (IST-Africa), Page 1 of 11-Page 11 of 11, 2018
Graphical Passwords: A Qualitative Study of Password Patterns
JS Vorster, RP van Heerden
The Proceedings of the 10th International Conference on Cyber Warfare and …, 2015
A Framework for the Implementation of Graphical Passwords
JS Vorster
M.Sc., University of Liverpool, 2014
A Study of Perceptions of Graphical Passwords
JS Vorster, RP Van Heerden
The Journal of Information Warfare 14 (3), 2015
The Pattern-richness of Graphical Passwords
JS Vorster, RP van Heerden, B Irwin
Proceedings of the 15th International Information Security South Africa …, 2016
Network mapping and usage determination
FP Senekal, JS Vorster
Military Information Communications Simposium South Africa 2007, Pretoria …, 2007
Applying data-mining techniques in honeypot analysis
N Veerasamy, PM Mokhonoana, JS Vorster
Information Security South Africa Conference (ISSA2006),1-5 July 2006, 2006
Implementing Honeypots as Part of a Simple Cost Effective Wireless Intrusion Detection System
HM Velupillai, RP van Heerden, JS Vorster
Southern African Telecommunications Networks and Applications Conference …, 2007
Violations of good security practices in graphical passwords schemes: Enterprise constraints on scheme-design
JS Vorster, B Irwin, RP Van Heerden
Proceedings of the 13th International Conference on Cyber Warfare and …, 2018
Information Warfare: An Information Manamgement Perspective
JS Vorster, R Van Heerden
IFIP TC9 Proceedings on ICT uses in Warfare and the Safeguarding of Peace, 76-83, 2008
Statistical Analysis of Popular Passwords
R van Heerden, JS Vorster
IFIP TC9 Proceedings on ICT uses in Warfare and the Safeguarding of Peace …, 2008
An innovative numerical algorithm for the calculation of intermittent building thermal loads
PG Rousseau, JS Vorster, EH Mathews
9th International Conference on Numerical Methods in Thermal Problems 9 (2 …, 1995
Journal of Information Warfare
BVW Irwin, T Nkhumeleni, M Aschmann, JJ van Vuuren, L Leenen, ...
Astronomical Maser Modelling
JS Vorster
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–18