@article{Venter2011,title = {A budget model for information security},journal = {Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2011},year = {2011},pages = {47-57},author = {Dlamini, M.T. and Eloff, M.M. and Eloff, J.H.P. and Venter, H.S.}}
2011
A prototype for achieving digital forensic readiness on wireless sensor networks
@inbook{RID:0814170417403-39,
title = {A prototype for achieving digital forensic readiness on wireless sensor networks},
chapter = {},
pages = {},
publisher = {},
year = {2011},
author = {Mouton, Francois and Venter, H. S. and IEEE},
editor = {},
booktitle = {Ieee Africon 2011}
}
2011
Adding digital forensic readiness to electronic communication using a security monitoring tool
@article{Venter2011,title = {Adding digital forensic readiness to electronic communication using a security monitoring tool},journal = {2011 Information Security for South Africa - Proceedings of the ISSA 2011 Conference},year = {2011},author = {Van Staden, F.R. and Venter, H.S.}}
2011
Detecting mobile spam botnets using artificial immune systems
@article{Venter2011,title = {Detecting mobile spam botnets using artificial immune systems},journal = {IFIP Advances in Information and Communication Technology},year = {2011},volume = {361},pages = {183-192},author = {Vural, I. and Venter, H.}}
2011
Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness
@article{Venter2011,title = {Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness},journal = {2011 Information Security for South Africa - Proceedings of the ISSA 2011 Conference},year = {2011},author = {Serra, S.M. and Venter, H.S.}}