@article{Venter2016,title = {Assessing the feasibility of conducting the digital forensic process in real time},journal = {Proceedings of the 11th International Conference on Cyber Warfare and Security, ICCWS 2016},year = {2016},pages = {146-155},author = {Grant, T. and Van Eijk, E. and Venter, H.S.}}
2016
Context Aware Mobile Application for Mobile Devices
@inbook{RID:0814170417387-10,
title = {Context Aware Mobile Application for Mobile Devices},
chapter = {},
pages = {85-90},
publisher = {},
year = {2016},
author = {Masango, Mfundo and Mouton, Francois and Nottingham, Alastair and Mtsweni, Jabu},
editor = {},
booktitle = {2016 Information Security For South Africa - Proceedings of the 2016 Issa Conference}
}
@article{Venter2016,title = {Introduction},journal = {2016 Information Security for South Africa - Proceedings of the 2016 ISSA Conference},year = {2016},author = {Venter, H. and Loock, M. and Coetzee, M. and Eloff, M. and Eloff, J.}}
2016
Introduction of concurrent processes into the digital forensic investigation process
@article{RID:0814170417388-3,
title = {Introduction of concurrent processes into the digital forensic investigation process},
journal = {Australian Journal of Forensic Sciences},
year = {2016},
author = {Valjarevic, Aleksandar and Venter, Hein S.},
volume = {48},
number = {3},
pages = {339-357}
}
2016
Observing Consistency in Online Communication Patterns for User Re-Identification
@article{RID:0814170417389-2,
title = {Observing Consistency in Online Communication Patterns for User Re-Identification},
journal = {Plos One},
year = {2016},
author = {Adeyemi, Ikuesan Richard and Razak, Shukor Abd and Salleh, Mazleena and Venter, Hein S.},
volume = {11},
number = {12}
}