Database last updated on Nov. 22, 2024, 8 a.m. with a total of 426 publications sourced from ORCID.

Publications

Showing page 31 of 86 with a total of 426 Publications
Refine By Author







































































Refine By Type










Refine By Year









































2015
A model aimed at controlling the flow of information across jurisdictional boundaries
Trenwith, P., Venter, H.
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015


2015
A model for access management of potential digital evidence
Omeleze, S., Venter, H.
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015


2015
A model for the design of next generation e-supply chain digital forensic readiness tools
Masvosvere, D.J.E., Venter, H.S.
2015 Information Security for South Africa - Proceedings of the ISSA 2015 Conference


2015
Adding Event Reconstruction to a Cloud Forensic Readiness Model
Kebande, Victor R., Venter, H. S.
2015 Information Security For South Africa - Proceedings of the Issa 2015 Conference


2015
Adding event reconstruction to a Cloud Forensic Readiness model
Kebande, V.R., Venter, H.S.
2015 Information Security for South Africa - Proceedings of the ISSA 2015 Conference