@article{RID:0814170417404-43,
title = {Considerations towards a cyber crime profiling system},
journal = {Ares 2008: Proceedings of the Third International Conference on Availability, Security and Reliability},
year = {2008},
author = {Arthur, Kweku K. and Olivier, Martin S. and Venter, Hein S. and Eloff, Jan H. P.},
pages = {1388-1393}
}
@article{RID:0814170417404-42,
title = {Standardising vulnerability categories},
journal = {Computers & Security},
year = {2008},
author = {Venter, H. S. and Eloff, J. H. P. and Li, Y. L.},
volume = {27},
number = {3-4},
pages = {71-83}
}
2008
Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy
@inbook{RID:0814170417405-44,
title = {Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy},
chapter = {},
pages = {56-+},
publisher = {},
year = {2008},
author = {Reddy, Kamil and Venter, H. S. and Olivier, Martin and Currie, Iain},
editor = {},
booktitle = {Sixth Annual Conference on Privacy, Security and Trust, Proceedings}
}
2008
Considerations Towards a Cyber Crime Profiling System
@inproceedings{Arthur_2008,doi = {10.1109/ares.2008.107},url = {http://dx.doi.org/10.1109/ares.2008.107},year = 2008,month = {mar},publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},author = {Kweku K. Arthur and Martin S. Olivier and Hein S. Venter and Jan H.P. Eloff},title = {Considerations Towards a Cyber Crime Profiling System},booktitle = {2008 Third International Conference on Availability, Reliability and Security}}
2008
A comparison of simulated traffic conditioner performance