@inbook{RID:0814170417394-18,
title = {Evaluation and Analysis of a Software Prototype for Guidance and Implementation of a Standardized Digital Forensic Investigation Process},
chapter = {},
pages = {},
publisher = {},
year = {2015},
author = {Ingels, Melissa and Valjarevic, Aleksandar and Venter, Hein S.},
editor = {},
booktitle = {2015 Information Security For South Africa - Proceedings of the Issa 2015 Conference}
}
2015
Evaluation and analysis of a software prototype for guidance and implementation of a standardized digital forensic investigation process
@article{Venter2015,title = {Evaluation and analysis of a software prototype for guidance and implementation of a standardized digital forensic investigation process},journal = {2015 Information Security for South Africa - Proceedings of the ISSA 2015 Conference},year = {2015},author = {Ingels, M. and Valjarevic, A. and Venter, H.S.}}
2015
Locating and tracking digital objects in the cloud
@article{Venter2015,title = {Locating and tracking digital objects in the cloud},journal = {IFIP Advances in Information and Communication Technology},year = {2015},volume = {462},pages = {287-301},author = {Trenwith, P. and Venter, H.}}
2015
Necessity for ethics in social engineering research
@article{RID:0814170417395-12,
title = {Necessity for ethics in social engineering research},
journal = {Computers & Security},
year = {2015},
author = {Mouton, Francois and Malan, Mercia M. and Kimppa, Kai K. and Venter, H. S.},
volume = {55},
pages = {114-127}
}
2015
Obfuscating a cloud-based botnet towards digital forensic readiness
Kebande, V., Venter, H.
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015
@article{Venter2015,title = {Obfuscating a cloud-based botnet towards digital forensic readiness},journal = {Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015},year = {2015},pages = {434-444},author = {Kebande, V. and Venter, H.}}