@article{Venter2007,title = {Applying The Biba integrity model to evidence management},journal = {IFIP International Federation for Information Processing},year = {2007},volume = {242},pages = {317-327},author = {Arthur, K. and Olivier, M. and Venter, H.}}
@article{Venter2007,title = {Foreword},journal = {IFIP Advances in Information and Communication Technology},year = {2007},volume = {232},author = {Eloff, J. and Venter, H.}}
2007
New approaches for security, privacy and trust in complex environments
@article{Venter2007,title = {New approaches for security, privacy and trust in complex environments},journal = {IFIP Advances in Information and Communication Technology},year = {2007},volume = {232},author = {Venter, H. and Eloff, M. and Labuschagne, L. and Eloff, J. and von Solms, R.}}
2007
Personal anomaly-based intrusion detection smart card using behavioural analysis
@inbook{RID:0814170417405-45,
title = {Personal anomaly-based intrusion detection smart card using behavioural analysis},
chapter = {},
pages = {217-+},
publisher = {},
year = {2007},
author = {Rossudowski, A. M. and Venter, H. S. and Eloff, J. H. P.},
editor = {},
booktitle = {New Approaches For Security, Privacy and Trust in Complex Environments},
volume = {232}
}
2007
Simulating adversarial interactions between intruders and system administrators using OODA-RR
@article{Venter2007,title = {Simulating adversarial interactions between intruders and system administrators using OODA-RR},journal = {ACM International Conference Proceeding Series},year = {2007},volume = {226},pages = {46-55},author = {Grant, T.J. and Venter, H.S. and Eloff, J.H.P.}}