@article{Venter2014,title = {Requirements for preparing the cloud to become ready for digital forensic investigation},journal = {European Conference on Information Warfare and Security, ECCWS},year = {2014},volume = {2014-January},pages = {242-250},author = {Dlamini, M. and Venter, H. and Eloff, J. and Eloff, M.}}
2014
Security issues in the security cyber supply chain in South Africa
@article{RID:0814170417398-24,
title = {Security issues in the security cyber supply chain in South Africa},
journal = {Technovation},
year = {2014},
author = {Venter, Hein S.},
volume = {34},
number = {7},
pages = {392-393}
}
@inbook{RID:0814170417399-25,
title = {Social Engineering Attack Framework},
chapter = {},
pages = {},
publisher = {},
year = {2014},
author = {Mouton, Francois and Malan, Mercia M. and Leenen, Louise and Venter, H. S.},
editor = {},
booktitle = {2014 Information Security For South Africa (Issa)}
}
@article{Venter2014,title = {Social engineering attack framework},journal = {2014 Information Security for South Africa - Proceedings of the ISSA 2014 Conference},year = {2014},author = {Mouton, F. and Malan, M.M. and Leenen, L. and Venter, H.S.}}
2014
Toward a General Ontology for Digital Forensic Disciplines
@article{RID:0814170417399-23,
title = {Toward a General Ontology for Digital Forensic Disciplines},
journal = {Journal of Forensic Sciences},
year = {2014},
author = {Karie, Nickson M. and Venter, Hein S.},
volume = {59},
number = {5},
pages = {1231-1241}
}