@article{Venter2010,title = {Adding digital forensic readiness to the email trace header},journal = {Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010},year = {2010},author = {Van Staden, F.R. and Venter, H.S.}}
2010
Information privacy in two dimensions towards a classification scheme for information privacy research
@article{Venter2010,title = {Information privacy in two dimensions towards a classification scheme for information privacy research},journal = {Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust},year = {2010},pages = {973-980},author = {Reddy, K. and Venter, H.S.}}
@article{Venter2010,title = {Social engineering attack detection model: SEADM},journal = {Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010},year = {2010},author = {Bezuidenhout, M. and Mouton, F. and Venter, H.S.}}
2010
Detecting XML data irregularities by means of lexical analysis and parsing
Kotze, D., Olivier, M.
9th European Conference on Information Warfare and Security 2010, ECIW 2010
@article { olivier2010,title = {Detecting XML data irregularities by means of lexical analysis and parsing},journal = {9th European Conference on Information Warfare and Security 2010, ECIW 2010},year = {2010},pages = {151-159},author = {Kotze, D. and Olivier, M.}}