H. S. Venter
List of publications from the DBLP Bibliography Server - FAQ
2008 | ||
---|---|---|
24 | Hein S. Venter, Mariki M. Eloff, Jan H. P. Eloff, Les Labuschagne: Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008 ISSA, Pretoria, South Africa 2008 | |
23 | EE | Kweku K. Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff: Considerations Towards a Cyber Crime Profiling System. ARES 2008: 1388-1393 |
22 | EE | Kamil Reddy, H. S. Venter, Martin S. Olivier, Iain Currie: Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. PST 2008: 56-64 |
21 | EE | Hein S. Venter, Jan H. P. Eloff, Y. L. Li: Standardising vulnerability categories. Computers & Security 27(3-4): 71-83 (2008) |
2007 | ||
20 | Hein S. Venter, Mariki M. Eloff, Les Labuschagne, Jan H. P. Eloff, Rossouw von Solms: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa Springer 2007 | |
19 | EE | Kweku K. Arthur, Martin S. Olivier, Hein S. Venter: Applying The Biba Integrity Model to Evidence Management. IFIP Int. Conf. Digital Forensics 2007: 317-327 |
18 | EE | T. J. Grant, H. S. Venter, Jan H. P. Eloff: Simulating adversarial interactions between intruders and system administrators using OODA-RR. SAICSIT Conf. 2007: 46-55 |
17 | EE | A. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff: Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. SEC 2007: 217-228 |
2006 | ||
16 | Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa ISSA, Pretoria, South Africa 2006 | |
15 | Bennie Fei, Jan H. P. Eloff, Martin S. Olivier, Hein S. Venter: Analysis of Web Proxy Logs. IFIP Int. Conf. Digital Forensics 2006: 247-258 | |
14 | Marika Wojcik, Hein S. Venter, Jan H. P. Eloff, Martin S. Olivier: Applying Machine Trust Models to Forensic Investigations. IFIP Int. Conf. Digital Forensics 2006: 55-65 | |
13 | EE | Marika Wojcik, Jan H. P. Eloff, H. S. Venter: Trust Model Architecture: Defining Prejudice by Learning. TrustBus 2006: 182-191 |
2005 | ||
12 | Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa ISSA, Pretoria, South Africa 2005 | |
11 | Rut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter: Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. IFIP Int. Conf. Digital Forensics 2005: 105-112 | |
10 | Bennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier: Exploring Forensic Data with Self-Organizing Maps. IFIP Int. Conf. Digital Forensics 2005: 113-123 | |
2004 | ||
9 | Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter: Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa ISSA, Pretoria, South Africa 2004 | |
8 | EE | H. S. Venter, Jan H. P. Eloff: Vulnerability forecasting - a conceptual model. Computers & Security 23(6): 489-497 (2004) |
2003 | ||
7 | EE | H. S. Venter, Jan H. P. Eloff: A taxonomy for information security technologies. Computers & Security 22(4): 299-307 (2003) |
6 | H. S. Venter, Jan H. P. Eloff: Evaluating vulnerability scanners using harmonised vulnerability categories. South African Computer Journal 31: 40-45 (2003) | |
2002 | ||
5 | EE | Hein S. Venter: Comparing Intrusion Detection Tools using Generic Vulnerability Categories. ISSA 2002: 1-18 |
4 | H. S. Venter, Jan H. P. Eloff: Vulnerabilities categories for intrusion detection system. Computers & Security 21(7): 617-619 (2002) | |
3 | H. S. Venter, Jan H. P. Eloff: Harmonising vulnerability categories. South African Computer Journal 29: 24-31 (2002) | |
1999 | ||
2 | H. S. Venter, Les Labuschagne, Jan H. P. Eloff: Real-time Risk Analysis on the Internet: a prototype. Conference on Information Security Management & Small Systems Security 1999: 11-28 | |
1998 | ||
1 | EE | H. S. Venter, Jan H. P. Eloff: Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools. Computers & Security 17(8): 683-692 (1998) |
1 | Kweku K. Arthur | [19] [23] |
2 | Iain Currie | [22] |
3 | Jan H. P. Eloff | [1] [2] [3] [4] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [20] [21] [23] [24] |
4 | Mariki M. Eloff | [9] [12] [16] [20] [24] |
5 | Bennie Fei | [10] [15] |
6 | T. J. Grant | [18] |
7 | Les Labuschagne | [2] [9] [12] [16] [20] [24] |
8 | Rut Laubscher | [11] |
9 | Y. L. Li | [21] |
10 | Martin S. Olivier | [10] [11] [14] [15] [19] [22] [23] |
11 | Cobus Rabe | [11] |
12 | Kamil Reddy | [22] |
13 | A. Maciej Rossudowski | [17] |
14 | Rossouw von Solms | [20] |
15 | Marika Wojcik | [13] [14] |