Database last updated on Jan. 26, 2026, 8 a.m. with a total of 456 publications sourced from ORCID.

Publications

Showing page 64 of 92 with a total of 456 Publications
Refine By Author
































































































Refine By Type











Refine By Year











































2010
A security privacy aware architecture and protocol for a single smart card used for multiple services
Rossudowski, A. M., Venter, H. S., Eloff, J. H. P., Kourie, D. G.
Computers & Security


2010
Adding digital forensic readiness to the email trace header
Van Staden, F.R., Venter, H.S.
Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010


2010
Information privacy in two dimensions towards a classification scheme for information privacy research
Reddy, K., Venter, H.S.
Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust


2010
Mobile Botnet detection using network forensics
Vural, I., Venter, H.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)


2010
Social engineering attack detection model: SEADM
Bezuidenhout, M., Mouton, F., Venter, H.S.
Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010