Database last updated on Sept. 6, 2025, 8 a.m. with a total of 437 publications sourced from ORCID.

Publications

Showing page 60 of 88 with a total of 437 Publications
Refine By Author

































































































Refine By Type










Refine By Year










































2010
A forensic readiness model for wireless networks
Ngobeni, S., Venter, H., Burke, I.
IFIP Advances in Information and Communication Technology


2010
A security privacy aware architecture and protocol for a single smart card used for multiple services
Rossudowski, A. M., Venter, H. S., Eloff, J. H. P., Kourie, D. G.
Computers & Security


2010
Adding digital forensic readiness to the email trace header
Van Staden, F.R., Venter, H.S.
Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010


2010
Information privacy in two dimensions towards a classification scheme for information privacy research
Reddy, K., Venter, H.S.
Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust


2010
Mobile Botnet detection using network forensics
Vural, I., Venter, H.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)