@article{Venter2016,title = {Architectural requirements specifications for designing digital forensic applications},journal = {European Conference on Information Warfare and Security, ECCWS},year = {2016},volume = {2016-January},pages = {405-416},author = {Omeleze, S. and Venter, H.}}
2016
Assessing the Feasibility of Conducting the Digital Forensic Process in Real Time
@article{RID:0814170417387-9,
title = {Assessing the Feasibility of Conducting the Digital Forensic Process in Real Time},
journal = {Proceedings of the 11th International Conference on Cyber Warfare and Security (Iccws 2016)},
year = {2016},
author = {Grant, Tim and van Eijk, Erwin and Venter, H. S. and Acad Conf Ltd},
pages = {146-155}
}
2016
Assessing the feasibility of conducting the digital forensic process in real time
@article{Venter2016,title = {Assessing the feasibility of conducting the digital forensic process in real time},journal = {Proceedings of the 11th International Conference on Cyber Warfare and Security, ICCWS 2016},year = {2016},pages = {146-155},author = {Grant, T. and Van Eijk, E. and Venter, H.S.}}
2016
Context Aware Mobile Application for Mobile Devices
@inbook{RID:0814170417387-10,
title = {Context Aware Mobile Application for Mobile Devices},
chapter = {},
pages = {85-90},
publisher = {},
year = {2016},
author = {Masango, Mfundo and Mouton, Francois and Nottingham, Alastair and Mtsweni, Jabu},
editor = {},
booktitle = {2016 Information Security For South Africa - Proceedings of the 2016 Issa Conference}
}
@article{Venter2016,title = {Introduction},journal = {2016 Information Security for South Africa - Proceedings of the 2016 ISSA Conference},year = {2016},author = {Venter, H. and Loock, M. and Coetzee, M. and Eloff, M. and Eloff, J.}}