Database last updated on June 29, 2025, 4 p.m. with a total of 434 publications sourced from ORCID.

Publications

Showing page 32 of 87 with a total of 434 Publications
Refine By Author

































































































Refine By Type










Refine By Year










































2015
A conflict-aware placement of client VMs in public cloud computing
Ratsoma, M.S., Dlamini, M.T., Eloff, J.H.P., Venter, H.
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015


2015
A framework of security safeguards for confidentiality and integrity of electronic personal information
Dala, P., Venter, H.
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015


2015
A functional architecture for cloud forensic readiness large-scale potential digital evidence analysis
Kebande, V., Venter, H.S.
European Conference on Information Warfare and Security, ECCWS


2015
A model aimed at controlling the flow of information across jurisdictional boundaries
Trenwith, P., Venter, H.
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015


2015
A model for access management of potential digital evidence
Omeleze, S., Venter, H.
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015