@article{Venter2013,title = {Digital forensic readiness in the cloud},journal = {2013 Information Security for South Africa - Proceedings of the ISSA 2013 Conference},year = {2013},author = {Trenwith, P.M. and Venter, H.S.}}
2013
Implementation guidelines for a harmonised digital forensic investigation readiness process model
@article{Venter2013,title = {Implementation guidelines for a harmonised digital forensic investigation readiness process model},journal = {2013 Information Security for South Africa - Proceedings of the ISSA 2013 Conference},year = {2013},author = {Valjarevic, A. and Venter, H.S.}}
2013
Resolving terminology heterogeneity in digital forensics using the web
@article{Venter2013,title = {Resolving terminology heterogeneity in digital forensics using the web},journal = {European Conference on Information Warfare and Security, ECCWS},year = {2013},pages = {328-335},author = {Karie, N. and Venter, H.}}
2013
Selection and ranking of remote hosts for digital forensic investigation in a Cloud environment
@article{Venter2013,title = {Selection and ranking of remote hosts for digital forensic investigation in a Cloud environment},journal = {2013 Information Security for South Africa - Proceedings of the ISSA 2013 Conference},year = {2013},author = {Sibiya, G. and Fogwill, T. and Venter, H.S.}}
2013
Social engineering from a normative ethics perspective
@article{Venter2013,title = {Social engineering from a normative ethics perspective},journal = {2013 Information Security for South Africa - Proceedings of the ISSA 2013 Conference},year = {2013},author = {Mouton, F. and Malan, M.M. and Venter, H.S.}}