H. S. Venter
List of publications from the
| 2008 |
| 24 | | Hein S. Venter,
Mariki M. Eloff,
Jan H. P. Eloff,
Les Labuschagne:
Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008
ISSA, Pretoria, South Africa 2008 |
| 23 | EE | Kweku K. Arthur,
Martin S. Olivier,
Hein S. Venter,
Jan H. P. Eloff:
Considerations Towards a Cyber Crime Profiling System.
ARES 2008: 1388-1393 |
| 22 | EE | Kamil Reddy,
H. S. Venter,
Martin S. Olivier,
Iain Currie:
Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy.
PST 2008: 56-64 |
| 21 | EE | Hein S. Venter,
Jan H. P. Eloff,
Y. L. Li:
Standardising vulnerability categories.
Computers & Security 27(3-4): 71-83 (2008) |
| 2007 |
| 20 | | Hein S. Venter,
Mariki M. Eloff,
Les Labuschagne,
Jan H. P. Eloff,
Rossouw von Solms:
New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa
Springer 2007 |
| 19 | EE | Kweku K. Arthur,
Martin S. Olivier,
Hein S. Venter:
Applying The Biba Integrity Model to Evidence Management.
IFIP Int. Conf. Digital Forensics 2007: 317-327 |
| 18 | EE | T. J. Grant,
H. S. Venter,
Jan H. P. Eloff:
Simulating adversarial interactions between intruders and system administrators using OODA-RR.
SAICSIT Conf. 2007: 46-55 |
| 17 | EE | A. Maciej Rossudowski,
Hein S. Venter,
Jan H. P. Eloff:
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis.
SEC 2007: 217-228 |
| 2006 |
| 16 | | Jan H. P. Eloff,
Les Labuschagne,
Mariki M. Eloff,
Hein S. Venter:
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa
ISSA, Pretoria, South Africa 2006 |
| 15 | | Bennie Fei,
Jan H. P. Eloff,
Martin S. Olivier,
Hein S. Venter:
Analysis of Web Proxy Logs.
IFIP Int. Conf. Digital Forensics 2006: 247-258 |
| 14 | | Marika Wojcik,
Hein S. Venter,
Jan H. P. Eloff,
Martin S. Olivier:
Applying Machine Trust Models to Forensic Investigations.
IFIP Int. Conf. Digital Forensics 2006: 55-65 |
| 13 | EE | Marika Wojcik,
Jan H. P. Eloff,
H. S. Venter:
Trust Model Architecture: Defining Prejudice by Learning.
TrustBus 2006: 182-191 |
| 2005 |
| 12 | | Jan H. P. Eloff,
Les Labuschagne,
Mariki M. Eloff,
Hein S. Venter:
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa
ISSA, Pretoria, South Africa 2005 |
| 11 | | Rut Laubscher,
Cobus Rabe,
Martin S. Olivier,
Jan H. P. Eloff,
H. S. Venter:
Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment.
IFIP Int. Conf. Digital Forensics 2005: 105-112 |
| 10 | | Bennie Fei,
Jan H. P. Eloff,
H. S. Venter,
Martin S. Olivier:
Exploring Forensic Data with Self-Organizing Maps.
IFIP Int. Conf. Digital Forensics 2005: 113-123 |
| 2004 |
| 9 | | Jan H. P. Eloff,
Les Labuschagne,
Mariki M. Eloff,
Hein S. Venter:
Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa
ISSA, Pretoria, South Africa 2004 |
| 8 | EE | H. S. Venter,
Jan H. P. Eloff:
Vulnerability forecasting - a conceptual model.
Computers & Security 23(6): 489-497 (2004) |
| 2003 |
| 7 | EE | H. S. Venter,
Jan H. P. Eloff:
A taxonomy for information security technologies.
Computers & Security 22(4): 299-307 (2003) |
| 6 | | H. S. Venter,
Jan H. P. Eloff:
Evaluating vulnerability scanners using harmonised vulnerability categories.
South African Computer Journal 31: 40-45 (2003) |
| 2002 |
| 5 | EE | Hein S. Venter:
Comparing Intrusion Detection Tools using Generic Vulnerability Categories.
ISSA 2002: 1-18 |
| 4 | | H. S. Venter,
Jan H. P. Eloff:
Vulnerabilities categories for intrusion detection system.
Computers & Security 21(7): 617-619 (2002) |
| 3 | | H. S. Venter,
Jan H. P. Eloff:
Harmonising vulnerability categories.
South African Computer Journal 29: 24-31 (2002) |
| 1999 |
| 2 | | H. S. Venter,
Les Labuschagne,
Jan H. P. Eloff:
Real-time Risk Analysis on the Internet: a prototype.
Conference on Information Security Management & Small Systems Security 1999: 11-28 |
| 1998 |
| 1 | EE | H. S. Venter,
Jan H. P. Eloff:
Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools.
Computers & Security 17(8): 683-692 (1998) |