@article{RID:0814170417396-21,
title = {Social Engineering Attack Detection Model: SEADMv2},
journal = {2015 International Conference on Cyberworlds (Cw)},
year = {2015},
author = {Mouton, Francois and Leenen, Louise and Venter, H. S. and IEEE},
pages = {216-223}
}
2015
Strong authentication: Closing the front door to prevent unauthorised access to cloud resources
@article{Venter2015,title = {Strong authentication: Closing the front door to prevent unauthorised access to cloud resources},journal = {Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015},year = {2015},pages = {252-260},author = {Raphiri, T.V. and Dlamini, M.T. and Venter, H.}}
@article{RID:0814170417396-13,
title = {Taxonomy of Challenges for Digital Forensics},
journal = {Journal of Forensic Sciences},
year = {2015},
author = {Karie, Nickson M. and Venter, Hein S.},
volume = {60},
number = {4},
pages = {885-893}
}
2015
Towards a model for characterizing potential digital evidence in the cloud environment during digital forensic readiness process
Kebande, V., Venter, H.
Proceedings of the International Conference on Cloud Security Management, ICCSM
@article{Venter2015,title = {Towards a model for characterizing potential digital evidence in the cloud environment during digital forensic readiness process},journal = {Proceedings of the International Conference on Cloud Security Management, ICCSM},year = {2015},volume = {2015-January},pages = {151-166},author = {Kebande, V. and Venter, H.}}
2015
Playing hide-and-seek: Detecting the manipulation of Android Timestamps
@inproceedings{Pieterse_2015,doi = {10.1109/issa.2015.7335065},url = {http://dx.doi.org/10.1109/issa.2015.7335065},year = 2015,month = {aug},publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},author = {Heloise Pieterse and Martin S. Olivier and Renier P. van Heerden},title = {Playing hide-and-seek: Detecting the manipulation of Android Timestamps},booktitle = {2015 Information Security for South Africa ({ISSA})}}