@article{Venter2013,title = {Resolving terminology heterogeneity in digital forensics using the web},journal = {European Conference on Information Warfare and Security, ECCWS},year = {2013},pages = {328-335},author = {Karie, N. and Venter, H.}}
2013
Selection and ranking of remote hosts for digital forensic investigation in a Cloud environment
@article{Venter2013,title = {Selection and ranking of remote hosts for digital forensic investigation in a Cloud environment},journal = {2013 Information Security for South Africa - Proceedings of the ISSA 2013 Conference},year = {2013},author = {Sibiya, G. and Fogwill, T. and Venter, H.S.}}
2013
Social engineering from a normative ethics perspective
@article{Venter2013,title = {Social engineering from a normative ethics perspective},journal = {2013 Information Security for South Africa - Proceedings of the ISSA 2013 Conference},year = {2013},author = {Mouton, F. and Malan, M.M. and Venter, H.S.}}
2013
Testing the harmonised digital forensic investigation process model-using an Android mobile phone
@article{Venter2013,title = {Testing the harmonised digital forensic investigation process model-using an Android mobile phone},journal = {2013 Information Security for South Africa - Proceedings of the ISSA 2013 Conference},year = {2013},author = {Omeleze, S. and Venter, H.S.}}
2013
The architecture of a digital forensic readiness management system
@article{RID:0814170417401-32,
title = {The architecture of a digital forensic readiness management system},
journal = {Computers & Security},
year = {2013},
author = {Reddy, K. and Venter, H. S.},
volume = {32},
pages = {73-89}
}