@article{Venter2012,title = {Implementing forensic readiness using performance monitoring tools},journal = {IFIP Advances in Information and Communication Technology},year = {2012},volume = {383 AICT},pages = {261-270},author = {Van Staden, F. and Venter, H.}}
2012
Measuring Semantic Similarity Between Digital Forensics Terminologies Using Web Search Engines
@article{RID:0814170417402-36,
title = {Measuring Semantic Similarity Between Digital Forensics Terminologies Using Web Search Engines},
journal = {2012 Information Security For South Africa (Issa)},
year = {2012},
author = {Karie, Nickson M. and Venter, Hein S.}
}
2012
Measuring semantic similarity between digital forensics terminologies using web search engines
@article{Venter2012,title = {Measuring semantic similarity between digital forensics terminologies using web search engines},journal = {2012 Information Security for South Africa - Proceedings of the ISSA 2012 Conference},year = {2012},author = {Karie, N.M. and Venter, H.S.}}
2012
Spamming botnet detection using neural networks
Vural, I., Venter, H.
Proceedings of the 9th International Workshop on Security in Information Systems, WOSIS 2012, in Conjunction with ICEIS 2012
@article{Venter2012,title = {Spamming botnet detection using neural networks},journal = {Proceedings of the 9th International Workshop on Security in Information Systems, WOSIS 2012, in Conjunction with ICEIS 2012},year = {2012},pages = {27-38},author = {Vural, I. and Venter, H.}}
2012
The modelling of a digital forensic readiness approach for wireless Local Area Networks
@article{Venter2012,title = {The modelling of a digital forensic readiness approach for wireless Local Area Networks},journal = {Journal of Universal Computer Science},year = {2012},volume = {18},number = {12},pages = {1721-1740},author = {Ngobeni, S. and Venter, H. and Burke, I.}}