Database last updated on April 13, 2026, 8 a.m. with a total of 461 publications sourced from ORCID.

Publications

Showing page 38 of 93 with a total of 461 Publications
Refine By Author






























































































































Refine By Type











Refine By Year











































2015
A model aimed at controlling the flow of information across jurisdictional boundaries
Trenwith, P., Venter, H.
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015


2015
A model for access management of potential digital evidence
Omeleze, S., Venter, H.
Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015


2015
A model for the design of next generation e-supply chain digital forensic readiness tools
Masvosvere, D.J.E., Venter, H.S.
2015 Information Security for South Africa - Proceedings of the ISSA 2015 Conference


2015
Adding Event Reconstruction to a Cloud Forensic Readiness Model
Kebande, Victor R., Venter, H. S.
2015 Information Security For South Africa - Proceedings of the Issa 2015 Conference


2015
Adding event reconstruction to a Cloud Forensic Readiness model
Kebande, V.R., Venter, H.S.
2015 Information Security for South Africa - Proceedings of the ISSA 2015 Conference