H. S. Venter
List of publications from the
2008 |
24 | | Hein S. Venter,
Mariki M. Eloff,
Jan H. P. Eloff,
Les Labuschagne:
Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008
ISSA, Pretoria, South Africa 2008 |
23 | EE | Kweku K. Arthur,
Martin S. Olivier,
Hein S. Venter,
Jan H. P. Eloff:
Considerations Towards a Cyber Crime Profiling System.
ARES 2008: 1388-1393 |
22 | EE | Kamil Reddy,
H. S. Venter,
Martin S. Olivier,
Iain Currie:
Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy.
PST 2008: 56-64 |
21 | EE | Hein S. Venter,
Jan H. P. Eloff,
Y. L. Li:
Standardising vulnerability categories.
Computers & Security 27(3-4): 71-83 (2008) |
2007 |
20 | | Hein S. Venter,
Mariki M. Eloff,
Les Labuschagne,
Jan H. P. Eloff,
Rossouw von Solms:
New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa
Springer 2007 |
19 | EE | Kweku K. Arthur,
Martin S. Olivier,
Hein S. Venter:
Applying The Biba Integrity Model to Evidence Management.
IFIP Int. Conf. Digital Forensics 2007: 317-327 |
18 | EE | T. J. Grant,
H. S. Venter,
Jan H. P. Eloff:
Simulating adversarial interactions between intruders and system administrators using OODA-RR.
SAICSIT Conf. 2007: 46-55 |
17 | EE | A. Maciej Rossudowski,
Hein S. Venter,
Jan H. P. Eloff:
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis.
SEC 2007: 217-228 |
2006 |
16 | | Jan H. P. Eloff,
Les Labuschagne,
Mariki M. Eloff,
Hein S. Venter:
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa
ISSA, Pretoria, South Africa 2006 |
15 | | Bennie Fei,
Jan H. P. Eloff,
Martin S. Olivier,
Hein S. Venter:
Analysis of Web Proxy Logs.
IFIP Int. Conf. Digital Forensics 2006: 247-258 |
14 | | Marika Wojcik,
Hein S. Venter,
Jan H. P. Eloff,
Martin S. Olivier:
Applying Machine Trust Models to Forensic Investigations.
IFIP Int. Conf. Digital Forensics 2006: 55-65 |
13 | EE | Marika Wojcik,
Jan H. P. Eloff,
H. S. Venter:
Trust Model Architecture: Defining Prejudice by Learning.
TrustBus 2006: 182-191 |
2005 |
12 | | Jan H. P. Eloff,
Les Labuschagne,
Mariki M. Eloff,
Hein S. Venter:
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa
ISSA, Pretoria, South Africa 2005 |
11 | | Rut Laubscher,
Cobus Rabe,
Martin S. Olivier,
Jan H. P. Eloff,
H. S. Venter:
Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment.
IFIP Int. Conf. Digital Forensics 2005: 105-112 |
10 | | Bennie Fei,
Jan H. P. Eloff,
H. S. Venter,
Martin S. Olivier:
Exploring Forensic Data with Self-Organizing Maps.
IFIP Int. Conf. Digital Forensics 2005: 113-123 |
2004 |
9 | | Jan H. P. Eloff,
Les Labuschagne,
Mariki M. Eloff,
Hein S. Venter:
Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa
ISSA, Pretoria, South Africa 2004 |
8 | EE | H. S. Venter,
Jan H. P. Eloff:
Vulnerability forecasting - a conceptual model.
Computers & Security 23(6): 489-497 (2004) |
2003 |
7 | EE | H. S. Venter,
Jan H. P. Eloff:
A taxonomy for information security technologies.
Computers & Security 22(4): 299-307 (2003) |
6 | | H. S. Venter,
Jan H. P. Eloff:
Evaluating vulnerability scanners using harmonised vulnerability categories.
South African Computer Journal 31: 40-45 (2003) |
2002 |
5 | EE | Hein S. Venter:
Comparing Intrusion Detection Tools using Generic Vulnerability Categories.
ISSA 2002: 1-18 |
4 | | H. S. Venter,
Jan H. P. Eloff:
Vulnerabilities categories for intrusion detection system.
Computers & Security 21(7): 617-619 (2002) |
3 | | H. S. Venter,
Jan H. P. Eloff:
Harmonising vulnerability categories.
South African Computer Journal 29: 24-31 (2002) |
1999 |
2 | | H. S. Venter,
Les Labuschagne,
Jan H. P. Eloff:
Real-time Risk Analysis on the Internet: a prototype.
Conference on Information Security Management & Small Systems Security 1999: 11-28 |
1998 |
1 | EE | H. S. Venter,
Jan H. P. Eloff:
Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools.
Computers & Security 17(8): 683-692 (1998) |