Database last updated on April 28, 2025, 4 p.m. with a total of 433 publications sourced from ORCID.
Publications
Showing page 32 of 87 with a total of 433 Publications
Bibtex
Refine By Author
Refine By Type
Refine By Year
2015
A framework of security safeguards for confidentiality and integrity of electronic personal information
Dala, P., Venter, H.
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015
@article{Venter2015,title = {A framework of security safeguards for confidentiality and integrity of electronic personal information},journal = {Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015},year = {2015},pages = {415-424},author = {Dala, P. and Venter, H.}}
2015
A functional architecture for cloud forensic readiness large-scale potential digital evidence analysis
@article{Venter2015,title = {A functional architecture for cloud forensic readiness large-scale potential digital evidence analysis},journal = {European Conference on Information Warfare and Security, ECCWS},year = {2015},volume = {2015-January},pages = {373-382},author = {Kebande, V. and Venter, H.S.}}
2015
A model aimed at controlling the flow of information across jurisdictional boundaries
Trenwith, P., Venter, H.
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015
@article{Venter2015,title = {A model aimed at controlling the flow of information across jurisdictional boundaries},journal = {Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015},year = {2015},pages = {510-516},author = {Trenwith, P. and Venter, H.}}
2015
A model for access management of potential digital evidence
Omeleze, S., Venter, H.
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015
@article{Venter2015,title = {A model for access management of potential digital evidence},journal = {Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015},year = {2015},pages = {491-501},author = {Omeleze, S. and Venter, H.}}
2015
A model for the design of next generation e-supply chain digital forensic readiness tools
@article{Venter2015,title = {A model for the design of next generation e-supply chain digital forensic readiness tools},journal = {2015 Information Security for South Africa - Proceedings of the ISSA 2015 Conference},year = {2015},author = {Masvosvere, D.J.E. and Venter, H.S.}}