Database last updated on June 30, 2025, 8 a.m. with a total of 434 publications sourced from ORCID.

Publications

Showing page 40 of 87 with a total of 434 Publications
Refine By Author

































































































Refine By Type










Refine By Year










































2014
Models for the forensic monitoring of cloud virtual machines
Ras, D., Venter, H.
European Conference on Information Warfare and Security, ECCWS


2014
Proceedings of the ISSA 2014 Conference 13-14 August 2014 Radisson Blu Gautrain Hotel Sandton Johannesburg South Africa Introduction
Venter, Hein, Loock, Marianne, Coetzee, Marijke, Eloff, Mariki
2014 Information Security For South Africa (Issa)


2014
Requirements for preparing the cloud to become ready for digital forensic investigation
Dlamini, M., Venter, H., Eloff, J., Eloff, M.
European Conference on Information Warfare and Security, ECCWS


2014
Security issues in the security cyber supply chain in South Africa
Venter, Hein S.
Technovation


2014
Social Engineering Attack Framework
Mouton, Francois, Malan, Mercia M., Leenen, Louise, Venter, H. S.
2014 Information Security For South Africa (Issa)