@article{RID:0814170417395-12,
title = {Necessity for ethics in social engineering research},
journal = {Computers & Security},
year = {2015},
author = {Mouton, Francois and Malan, Mercia M. and Kimppa, Kai K. and Venter, H. S.},
volume = {55},
pages = {114-127}
}
2015
Obfuscating a cloud-based botnet towards digital forensic readiness
Kebande, V., Venter, H.
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015
@article{Venter2015,title = {Obfuscating a cloud-based botnet towards digital forensic readiness},journal = {Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015},year = {2015},pages = {434-444},author = {Kebande, V. and Venter, H.}}
2015
Proceedings of the ISSA 2015 Conference 12-13 August 2015 54 On Bath Hotel Rosebank Johannesburg South Africa Introduction
@inbook{RID:0814170417395-20,
title = {Proceedings of the ISSA 2015 Conference 12-13 August 2015 54 On Bath Hotel Rosebank Johannesburg South Africa Introduction},
chapter = {},
pages = {},
publisher = {},
year = {2015},
author = {Venter, Hein and Loock, Marianne and Coetzee, Marijke and Eloff, Mariki},
editor = {},
booktitle = {2015 Information Security For South Africa - Proceedings of the Issa 2015 Conference}
}
2015
Social Engineering Attack Detection Model: SEADMv2
@article{RID:0814170417396-21,
title = {Social Engineering Attack Detection Model: SEADMv2},
journal = {2015 International Conference on Cyberworlds (Cw)},
year = {2015},
author = {Mouton, Francois and Leenen, Louise and Venter, H. S. and IEEE},
pages = {216-223}
}
2015
Strong authentication: Closing the front door to prevent unauthorised access to cloud resources
@article{Venter2015,title = {Strong authentication: Closing the front door to prevent unauthorised access to cloud resources},journal = {Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015},year = {2015},pages = {252-260},author = {Raphiri, T.V. and Dlamini, M.T. and Venter, H.}}