Database last updated on July 12, 2025, 8 a.m. with a total of 435 publications sourced from ORCID.

Publications

Showing page 59 of 87 with a total of 435 Publications
Refine By Author

































































































Refine By Type










Refine By Year










































2011
User-centric information security systems - A living lab approach
Dlamini, M., Eloff, J., Zielinksi, M., Chuang, J., Smit, D.
10th European Conference on Information Warfare and Security 2011, ECIW 2011


2011
Assembling metadata for database forensics
Beyers, H., Olivier, M., Hancke, G.
IFIP Advances in Information and Communication Technology


2011
Steganographic techniques for hiding data in SWF files
Fouche, M.-A., Olivier, M.
IFIP Advances in Information and Communication Technology


2010
A forensic readiness model for wireless networks
Ngobeni, S., Venter, H., Burke, I.
IFIP Advances in Information and Communication Technology


2010
A security privacy aware architecture and protocol for a single smart card used for multiple services
Rossudowski, A. M., Venter, H. S., Eloff, J. H. P., Kourie, D. G.
Computers & Security