dblp.uni-trier.dewww.uni-trier.de

Hein S. Venter

H. S. Venter

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
24 Hein S. Venter, Mariki M. Eloff, Jan H. P. Eloff, Les Labuschagne: Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008 ISSA, Pretoria, South Africa 2008
23EEKweku K. Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff: Considerations Towards a Cyber Crime Profiling System. ARES 2008: 1388-1393
22EEKamil Reddy, H. S. Venter, Martin S. Olivier, Iain Currie: Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. PST 2008: 56-64
21EEHein S. Venter, Jan H. P. Eloff, Y. L. Li: Standardising vulnerability categories. Computers & Security 27(3-4): 71-83 (2008)
2007
20 Hein S. Venter, Mariki M. Eloff, Les Labuschagne, Jan H. P. Eloff, Rossouw von Solms: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa Springer 2007
19EEKweku K. Arthur, Martin S. Olivier, Hein S. Venter: Applying The Biba Integrity Model to Evidence Management. IFIP Int. Conf. Digital Forensics 2007: 317-327
18EET. J. Grant, H. S. Venter, Jan H. P. Eloff: Simulating adversarial interactions between intruders and system administrators using OODA-RR. SAICSIT Conf. 2007: 46-55
17EEA. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff: Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. SEC 2007: 217-228
2006
16 Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa ISSA, Pretoria, South Africa 2006
15 Bennie Fei, Jan H. P. Eloff, Martin S. Olivier, Hein S. Venter: Analysis of Web Proxy Logs. IFIP Int. Conf. Digital Forensics 2006: 247-258
14 Marika Wojcik, Hein S. Venter, Jan H. P. Eloff, Martin S. Olivier: Applying Machine Trust Models to Forensic Investigations. IFIP Int. Conf. Digital Forensics 2006: 55-65
13EEMarika Wojcik, Jan H. P. Eloff, H. S. Venter: Trust Model Architecture: Defining Prejudice by Learning. TrustBus 2006: 182-191
2005
12 Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa ISSA, Pretoria, South Africa 2005
11 Rut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter: Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. IFIP Int. Conf. Digital Forensics 2005: 105-112
10 Bennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier: Exploring Forensic Data with Self-Organizing Maps. IFIP Int. Conf. Digital Forensics 2005: 113-123
2004
9 Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa ISSA, Pretoria, South Africa 2004
8EEH. S. Venter, Jan H. P. Eloff: Vulnerability forecasting - a conceptual model. Computers & Security 23(6): 489-497 (2004)
2003
7EEH. S. Venter, Jan H. P. Eloff: A taxonomy for information security technologies. Computers & Security 22(4): 299-307 (2003)
6 H. S. Venter, Jan H. P. Eloff: Evaluating vulnerability scanners using harmonised vulnerability categories. South African Computer Journal 31: 40-45 (2003)
2002
5EEHein S. Venter: Comparing Intrusion Detection Tools using Generic Vulnerability Categories. ISSA 2002: 1-18
4 H. S. Venter, Jan H. P. Eloff: Vulnerabilities categories for intrusion detection system. Computers & Security 21(7): 617-619 (2002)
3 H. S. Venter, Jan H. P. Eloff: Harmonising vulnerability categories. South African Computer Journal 29: 24-31 (2002)
1999
2 H. S. Venter, Les Labuschagne, Jan H. P. Eloff: Real-time Risk Analysis on the Internet: a prototype. Conference on Information Security Management & Small Systems Security 1999: 11-28
1998
1EEH. S. Venter, Jan H. P. Eloff: Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools. Computers & Security 17(8): 683-692 (1998)

Coauthor Index

1Kweku K. Arthur [19] [23]
2Iain Currie [22]
3Jan H. P. Eloff [1] [2] [3] [4] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [20] [21] [23] [24]
4Mariki M. Eloff [9] [12] [16] [20] [24]
5Bennie Fei [10] [15]
6T. J. Grant [18]
7Les Labuschagne [2] [9] [12] [16] [20] [24]
8Rut Laubscher [11]
9Y. L. Li [21]
10Martin S. Olivier [10] [11] [14] [15] [19] [22] [23]
11Cobus Rabe [11]
12Kamil Reddy [22]
13A. Maciej Rossudowski [17]
14Rossouw von Solms [20]
15Marika Wojcik [13] [14]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)