Database last updated on July 3, 2024, 4 p.m. with a total of 420 publications sourced from ORCID.

Publications

Showing page 57 of 84 with a total of 420 Publications
Refine By Author






































































Refine By Type










Refine By Year









































2010
Adding digital forensic readiness to the email trace header
Van Staden, F.R., Venter, H.S.
Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010


2010
Information privacy in two dimensions towards a classification scheme for information privacy research
Reddy, K., Venter, H.S.
Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust


2010
Mobile Botnet detection using network forensics
Vural, I., Venter, H.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)


2010
Social engineering attack detection model: SEADM
Bezuidenhout, M., Mouton, F., Venter, H.S.
Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010


2010
Detecting XML data irregularities by means of lexical analysis and parsing
Kotze, D., Olivier, M.
9th European Conference on Information Warfare and Security 2010, ECIW 2010