@inbook{RID:0814170417392-17,
title = {A Model for the Design of Next Generation e-supply Chain Digital Forensic Readiness Tools},
chapter = {},
pages = {},
publisher = {},
year = {2015},
author = {Masvosvere, D. J. E. and Venter, H. S.},
editor = {},
booktitle = {2015 Information Security For South Africa - Proceedings of the Issa 2015 Conference}
}
2015
A conceptual model for digital forensic readiness in e-supply chains
@article{Venter2015,title = {A conceptual model for digital forensic readiness in e-supply chains},journal = {European Conference on Information Warfare and Security, ECCWS},year = {2015},volume = {2015-January},pages = {413-422},author = {Masvosvere, D. and Venter, H.}}
2015
A conflict-aware placement of client VMs in public cloud computing
@article{Venter2015,title = {A conflict-aware placement of client VMs in public cloud computing},journal = {Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015},year = {2015},pages = {502-509},author = {Ratsoma, M.S. and Dlamini, M.T. and Eloff, J.H.P. and Venter, H.}}
2015
A framework of security safeguards for confidentiality and integrity of electronic personal information
Dala, P., Venter, H.
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015
@article{Venter2015,title = {A framework of security safeguards for confidentiality and integrity of electronic personal information},journal = {Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015},year = {2015},pages = {415-424},author = {Dala, P. and Venter, H.}}
2015
A functional architecture for cloud forensic readiness large-scale potential digital evidence analysis
@article{Venter2015,title = {A functional architecture for cloud forensic readiness large-scale potential digital evidence analysis},journal = {European Conference on Information Warfare and Security, ECCWS},year = {2015},volume = {2015-January},pages = {373-382},author = {Kebande, V. and Venter, H.S.}}