Database last updated on July 3, 2024, 8 a.m. with a total of 420 publications sourced from ORCID.

Publications

Showing page 33 of 84 with a total of 420 Publications
Refine By Author






































































Refine By Type










Refine By Year









































2015
Social Engineering Attack Detection Model: SEADMv2
Mouton, Francois, Leenen, Louise, Venter, H. S., IEEE
2015 International Conference on Cyberworlds (Cw)


2015
Strong authentication: Closing the front door to prevent unauthorised access to cloud resources
Raphiri, T.V., Dlamini, M.T., Venter, H.
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015


2015
Taxonomy of Challenges for Digital Forensics
Karie, Nickson M., Venter, Hein S.
Journal of Forensic Sciences


2015
Towards a model for characterizing potential digital evidence in the cloud environment during digital forensic readiness process
Kebande, V., Venter, H.
Proceedings of the International Conference on Cloud Security Management, ICCSM


2015
Playing hide-and-seek: Detecting the manipulation of Android Timestamps
Heloise Pieterse, Martin S. Olivier, Renier P. van Heerden
2015 Information Security for South Africa (ISSA)