Louise Leenen
Louise Leenen
Associate Professor, University of the Western Cape
Bestätigte E-Mail-Adresse bei uwc.ac.za
Titel
Zitiert von
Zitiert von
Jahr
Social engineering attack examples, templates and scenarios
F Mouton, L Leenen, HS Venter
Computers & Security 59, 186-209, 2016
1282016
Social engineering attack framework
F Mouton, MM Malan, L Leenen, HS Venter
2014 Information Security for South Africa, 1-9, 2014
752014
Towards an ontological model defining the social engineering domain
F Mouton, L Leenen, MM Malan, HS Venter
IFIP International Conference on Human Choice and Computers, 266-279, 2014
602014
Social engineering attack detection model: Seadmv2
F Mouton, L Leenen, HS Venter
2015 International Conference on Cyberworlds (CW), 216-223, 2015
262015
Systematic withdrawal
T Meyer, J Heidema, W Labuschagne, L Leenen
Journal of Philosophical Logic 31 (5), 415-443, 2002
252002
Ant colony induced decision trees for intrusion detection
F Botes, L Leenen, R De La Harpe
16th European Conference on Cyber Warfare and Security, 53-62, 2017
202017
A computer network attack taxonomy and ontology
RP Van Heerden, B Irwin, ID Burke, L Leenen
International Journal of Cyber Warfare and Terrorism (IJCWT) 2 (3), 12-25, 2012
192012
Implementation of a cyber security policy in South Africa: Reflection on progress and the way forward
M Grobler, JJ van Vuuren, L Leenen
IFIP International Conference on Human Choice and Computers, 215-225, 2012
182012
Automated classification of computer network attacks
R van Heerden, L Leenen, B Irwin
2013 International Conference on Adaptive Science and Technology, 1-7, 2013
132013
Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa
JCJ van Vuuren, L Leenen, JJ Zaaiman
ICCWS2014-9th International Conference on Cyber Warfare & Security: ICCWS …, 2014
122014
Modeling and solving semiring constraint satisfaction problems by transformation to weighted semiring Max-SAT
L Leenen, A Anbulagan, T Meyer, A Ghose
Australasian Joint Conference on Artificial Intelligence, 202-212, 2007
112007
Relaxations of semiring constraint satisfaction problems
L Leenen, T Meyer, A Ghose
Information processing letters 103 (5), 177-182, 2007
112007
Finite state machine for the social engineering attack detection model: SEADM
F Mouton, A Nottingham, L Leenen, HS Venter
SAIEE Africa Research Journal 109 (2), 133-148, 2018
102018
A constraint programming solution for the military unit path finding problem
L Leenen, A Terlunen, H Le Roux
Taylor & Francis Group, 2012
92012
AI 2007: Advances in Artificial Intelligence
MA Orgun, J Thornton
Springer-Verlag Berlin Heidelberg, 2007
9*2007
Underlying finite state machine for the social engineering attack detection model
F Mouton, A Nottingham, L Leenen, HS Venter
2017 Information Security for South Africa (ISSA), 98-105, 2017
72017
A constraint-based solver for the military unit path finding problem
L Leenen, J Vorster, H le Roux
Proceedings of the 2010 spring simulation multiconference, 1-8, 2010
72010
Branch and bound algorithms to solve semiring constraint satisfaction problems
L Leenen, A Ghose
Pacific Rim International Conference on Artificial Intelligence, 991-997, 2008
72008
Artificial intelligence and big data analytics in support of cyber defense
L Leenen, T Meyer
Developments in Information Security and Cybernetic Wars, 42-63, 2019
62019
Semantic technologies and big data analytics for cyber defence
L Leenen, T Meyer
Information Retrieval and Management: Concepts, Methodologies, Tools, and …, 2018
62018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20