Database last updated on Nov. 22, 2024, 8 a.m. with a total of 426 publications sourced from ORCID.
Publications
Showing page 31 of 86 with a total of 426 Publications
Bibtex
Refine By Author
Refine By Type
Refine By Year
2015
A model aimed at controlling the flow of information across jurisdictional boundaries
Trenwith, P., Venter, H.
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015
@article{Venter2015,title = {A model aimed at controlling the flow of information across jurisdictional boundaries},journal = {Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015},year = {2015},pages = {510-516},author = {Trenwith, P. and Venter, H.}}
2015
A model for access management of potential digital evidence
Omeleze, S., Venter, H.
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015
@article{Venter2015,title = {A model for access management of potential digital evidence},journal = {Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015},year = {2015},pages = {491-501},author = {Omeleze, S. and Venter, H.}}
2015
A model for the design of next generation e-supply chain digital forensic readiness tools
@article{Venter2015,title = {A model for the design of next generation e-supply chain digital forensic readiness tools},journal = {2015 Information Security for South Africa - Proceedings of the ISSA 2015 Conference},year = {2015},author = {Masvosvere, D.J.E. and Venter, H.S.}}
2015
Adding Event Reconstruction to a Cloud Forensic Readiness Model
@inbook{RID:0814170417393-19,
title = {Adding Event Reconstruction to a Cloud Forensic Readiness Model},
chapter = {},
pages = {},
publisher = {},
year = {2015},
author = {Kebande, Victor R. and Venter, H. S.},
editor = {},
booktitle = {2015 Information Security For South Africa - Proceedings of the Issa 2015 Conference}
}
2015
Adding event reconstruction to a Cloud Forensic Readiness model
@article{Venter2015,title = {Adding event reconstruction to a Cloud Forensic Readiness model},journal = {2015 Information Security for South Africa - Proceedings of the ISSA 2015 Conference},year = {2015},author = {Kebande, V.R. and Venter, H.S.}}