


default search action
Hein S. Venter
Person information
- affiliation: University of Pretoria, South Africa
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j27]Avinash Singh
, Richard Adeyemi Ikuesan
, Hein S. Venter
:
MalFe - Malware Feature Engineering Generation Platform. Comput. 12(10): 201 (2023) - [c87]Pardon Ramazhamba, Hein S. Venter:
A Blockchain Model for Sharing Information in Criminal Justice Systems. IFIP Int. Conf. Digital Forensics 2023: 249-266 - 2022
- [j26]Avinash Singh
, Richard Adeyemi Ikuesan, Hein S. Venter
:
Secure Storage Model for Digital Forensic Readiness. IEEE Access 10: 19469-19480 (2022) - [j25]Olaide Nathaniel Oyelade
, Absalom E. Ezugwu
, Hein S. Venter, Seyedali Mirjalili
, Amir H. Gandomi
:
Abnormality classification and localization using dual-branch whole-region-based CNN model with histopathological images. Comput. Biol. Medicine 149: 105943 (2022) - [j24]M. T. Dlamini
, Jan H. P. Eloff, H. S. Venter, Mariki M. Eloff:
CBAC4C: conflict-based VM isolation control for cloud computing. Int. Trans. Oper. Res. 29(1): 372-395 (2022) - [c86]Mvelo Mcuba, Avinash Singh
, Richard Adeyemi Ikuesan, Hein S. Venter:
The Effect of Deep Learning Methods on Deepfake Audio Detection for Digital Investigation. CENTERIS/ProjMAN/HCist 2022: 211-219 - [c85]Howard Munkhondya, Richard Adeyemi Ikuesan, Avinash Singh
, Hein S. Venter:
Understanding Issues and Challenges of DFR Implementation in SDN Platform. CENTERIS/ProjMAN/HCist 2022: 286-293 - [c84]P. T. Ramazhamba
, H. S. Venter:
A distributed model for sharing tendering project information in the South African Local Government. CW 2022: 243-250 - [i2]Avinash Singh, Richard Adeyemi Ikuesan, Hein S. Venter:
Ransomware Detection using Process Memory. CoRR abs/2203.16871 (2022) - 2021
- [j23]Sheunesu M. Makura
, H. S. Venter, Victor R. Kebande
, Nickson M. Karie, Richard Adeyemi Ikuesan, Sadi Alawadi:
Digital forensic readiness in operational cloud leveraging ISO/IEC 27043 guidelines on security monitoring. Secur. Priv. 4(3) (2021) - [c83]Stacey O. Baror
, Hein S. Venter, Richard Adeyemi Ikuesan
:
A Digital Forensic Readiness Cybercrime Semantic Trigger Process. AFRICOMM 2021: 319-339 - 2020
- [c82]Sheunesu M. Makura
, H. S. Venter, Adeyemi Richard Ikuesan
, Victor R. Kebande, Nickson M. Karie
:
Proactive Forensics: Keystroke Logging from the Cloud as Potential Digital Evidence for Forensic Readiness Purposes. ICIoT 2020: 200-205 - [c81]Richard Adeyemi Ikuesan
, Shefiu Olusegun Ganiyu, Muhammad Umar Majigi, Yusuf Drisu Opaluwa, Hein S. Venter:
Practical Approach to Urban Crime Prevention in Developing Nations. NISS 2020: 48:1-48:8 - [c80]Nickson M. Karie
, Victor R. Kebande
, Richard Adeyemi Ikuesan
, Mehdi Sookhak
, Hein S. Venter:
Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud. NISS 2020: 56:1-56:6 - [e16]Hein S. Venter
, Marianne Loock
, Marijke Coetzee
, Mariki M. Eloff
, Jan H. P. Eloff
:
Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings. Communications in Computer and Information Science 1166, Springer 2020, ISBN 978-3-030-43275-1 [contents] - [i1]Victor R. Kebande, Nickson M. Karie, Adeyemi Richard Ikuesan, Abdullah Al-Ghushami, H. S. Venter:
Detecting Centralized Architecture-Based Botnets using Travelling Salesperson Non-Deterministic Polynomial-Hard problem, TSP-NP Technique. CoRR abs/2004.08715 (2020)
2010 – 2019
- 2019
- [j22]Adeyemi R. Ikuesan
, Hein S. Venter:
Digital behavioral-fingerprint for user attribution in digital forensics: Are we there yet? Digit. Investig. 30: 73-89 (2019) - [j21]Adeyemi Richard Ikuesan
, Shukor Abd Razak, Hein S. Venter, Mazleena Salleh:
Polychronicity tendency-based online behavioral signature. Int. J. Mach. Learn. Cybern. 10(8): 2103-2118 (2019) - [c79]Albert Antwi-Boasiako, Hein S. Venter:
Implementing the Harmonized Model for Digital Evidence Admissibility Assessment. IFIP Int. Conf. Digital Forensics 2019: 19-36 - [c78]Lehlogonolo Ledwaba
, Gerhard P. Hancke
, Sherrin John Isaac, Hein S. Venter:
Developing a Secure, Smart Microgrid Energy Market using Distributed Ledger Technologies. INDIN 2019: 1725-1728 - [c77]Lelethu Zazaza
, H. S. Venter
, George Sibiya
:
A Conceptual Model for Consent Management in South African e-Health Systems for Privacy Preservation. ISSA 2019: 69-82 - [c76]Jaco-Louis Kruger, Hein S. Venter:
Requirements for IoT Forensics. NextComp 2019: 1-7 - [e15]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff:
Information Security - 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers. Communications in Computer and Information Science 973, Springer 2019, ISBN 978-3-030-11406-0 [contents] - 2018
- [j20]Lehlogonolo Ledwaba
, Gerhard P. Hancke
, Hein S. Venter, Sherrin John Isaac:
Performance Costs of Software Cryptography in Securing New-Generation Internet of Energy Endpoint Devices. IEEE Access 6: 9303-9323 (2018) - [j19]Ivans Kigwana
, H. S. Venter:
A Digital Forensic Readiness Architecture for Online Examinations. South Afr. Comput. J. 30(1) (2018) - [c75]Avinash Singh
, Adeyemi R. Ikuesan
, Hein S. Venter
:
Digital Forensic Readiness Framework for Ransomware Investigation. ICDF2C 2018: 91-105 - [c74]Lelethu Zazaza
, H. S. Venter
, George Sibiya
:
The Current State of Electronic Consent Systems in e-Health for Privacy Preservation. ISSA (Revised Selected Papers) 2018: 76-88 - [c73]Victor R. Kebande
, Semaka Malapane, Nickson M. Karie
, H. S. Venter, Ruth Diko Wario
:
Towards an Integrated Digital Forensic Investigation Framework for an IoT-Based Ecosystem. SmartIoT 2018: 93-98 - 2017
- [c72]Richard Adeyemi Ikuesan
, Shukor Abd Razak, Hein S. Venter
, Mazleena Salleh:
High-level online user attribution model based on human Polychronic-Monochronic tendency. BigComp 2017: 445-450 - [c71]Lehlogonolo Ledwaba, H. S. Venter:
A Threat-Vulnerability Based Risk Analysis Model for Cyber Physical System Security. HICSS 2017: 1-10 - [c70]Dominik Ernsberger, Adeyemi Richard Ikuesan
, Hein S. Venter, Alf Zugenmaier:
A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness. ICDF2C 2017: 64-79 - [c69]Albert Antwi-Boasiako, Hein S. Venter
:
A Model for Digital Evidence Admissibility Assessment. IFIP Int. Conf. Digital Forensics 2017: 23-38 - [c68]Francois Mouton
, Alastair Nottingham, Louise Leenen, H. S. Venter:
Underlying finite state machine for the social engineering attack detection model. ISSA 2017: 98-105 - [e14]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff:
2017 Information Security for South Africa, ISSA 2017, Johannesburg, South Africa, August 16-17, 2017. IEEE 2017, ISBN 978-1-5386-0545-5 [contents] - 2016
- [j18]Francois Mouton
, Louise Leenen, H. S. Venter
:
Social engineering attack examples, templates and scenarios. Comput. Secur. 59: 186-209 (2016) - [c67]M. T. Dlamini, Mariki M. Eloff, H. S. Venter, Jan H. P. Eloff, Jonathan M. Blackledge, K. Chetty:
Securing Cloud Computing's Blind-spots using Strong and Risk-based MFA. CONF-IRM 2016: 22 - [c66]Prittish Dala, Hein S. Venter
:
Understanding the Level of Compliance by South African Institutions to the Protection of Personal Information (POPI) Act. SAICSIT 2016: 13:1-13:8 - [e13]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff:
2016 Information Security for South Africa, ISSA 2016, Johannesburg, South Africa, August 17-18, 2016. IEEE 2016, ISBN 978-1-5090-2473-5 [contents] - 2015
- [j17]Francois Mouton, Mercia M. Malan, Kai K. Kimppa
, H. S. Venter
:
Necessity for ethics in social engineering research. Comput. Secur. 55: 114-127 (2015) - [c65]Stacey Omeleze
, Hein S. Venter
:
Proof of Concept of the Online Neighbourhood Watch System. AFRICOMM 2015: 78-93 - [c64]Francois Mouton
, Louise Leenen, H. S. Venter
:
Social Engineering Attack Detection Model: SEADMv2. CW 2015: 216-223 - [c63]Philip M. Trenwith, Hein S. Venter
:
Locating and Tracking Digital Objects in the Cloud. IFIP Int. Conf. Digital Forensics 2015: 287-301 - [c62]Melissa Ingles, Aleksandar Valjarevic, Hein S. Venter
:
Evaluation and analysis of a software prototype for guidance and implementation of a standardized digital forensic investigation process. ISSA 2015: 1-8 - [c61]Victor R. Kebande
, Hein S. Venter
:
Adding event reconstruction to a Cloud Forensic Readiness model. ISSA 2015: 1-9 - [c60]D. J. E. Masvosvere, Hein S. Venter
:
A model for the design of next generation e-supply chain digital forensic readiness tools. ISSA 2015: 1-9 - [c59]Hein S. Venter
, Marianne Loock, Marijke Coetzee
, Mariki M. Eloff
:
Introduction. ISSA 2015: 1 - [e12]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Stephen Flowerday:
2015 Information Security for South Africa, ISSA 2015, Johannesburg, South Africa, August 12-13, 2015. IEEE 2015, ISBN 978-1-4799-7755-0 [contents] - 2014
- [c58]Victor R. Kebande
, Hein S. Venter
:
A cognitive approach for botnet detection using Artificial Immune System in the cloud. CyberSec 2014: 52-57 - [c57]Francois Mouton
, Louise Leenen, Mercia M. Malan, H. S. Venter
:
Towards an Ontological Model Defining the Social Engineering Domain. HCC 2014: 266-279 - [c56]Stacey Omeleze, Hein S. Venter:
Towards a Model for acquiring Digital Evidence using Mobile Devices. INC 2014: 173-186 - [c55]Francois Mouton, Mercia M. Malan, Louise Leenen, Hein S. Venter
:
Social engineering attack framework. ISSA 2014: 1-9 - [c54]Emilio Raymond Mumba, Hein S. Venter
:
Mobile forensics using the harmonised digital forensic investigation process. ISSA 2014: 1-10 - [c53]Philip M. Trenwith, Hein S. Venter
:
A digital forensic model for providing better data provenance in the cloud. ISSA 2014: 1-6 - [c52]Aleksandar Valjarevic, Hein S. Venter
, Melissa Ingles:
Towards a prototype for guidance and implementation of a standardized digital forensic investigation process. ISSA 2014: 1-8 - [c51]Hein S. Venter
, Marianne Loock
, Marijke Coetzee
, Mariki M. Eloff
:
Introduction. ISSA 2014: 1 - [e11]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff:
2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014. IEEE 2014, ISBN 978-1-4799-3384-6 [contents] - 2013
- [j16]Kamil Reddy, Hein S. Venter
:
The architecture of a digital forensic readiness management system. Comput. Secur. 32: 73-89 (2013) - [j15]Enos K. Mabuto, Hein S. Venter:
System-Generated Digital Forensic Evidence in Graphic Design Applications. J. Digit. Forensics Secur. Law 8(3): 71-86 (2013) - [c50]George Sibiya
, Thomas Fogwill
, H. S. Venter
, Sipho Ngobeni:
Digital forensic readiness in a cloud environment. AFRICON 2013: 1-5 - [c49]Nickson M. Karie, Hein S. Venter:
An Ontological Framework for a Cloud Forensic Environment. EISMC 2013: 112-122 - [c48]Aleksandar Valjarevic, Hein S. Venter
:
A Harmonized Process Model for Digital Forensic Investigation Readiness. IFIP Int. Conf. Digital Forensics 2013: 67-82 - [c47]Nickson M. Karie
, Hein S. Venter
:
Towards a framework for enhancing potential digital evidence presentation. ISSA 2013: 1-8 - [c46]Francois Mouton
, Mercia M. Malan, Hein S. Venter
:
Social engineering from a normative ethics perspective. ISSA 2013: 1-8 - [c45]Stacey Omeleze
, Hein S. Venter
:
Testing the harmonised digital forensic investigation process model-using an Android mobile phone. ISSA 2013: 1-8 - [c44]George Sibiya
, Thomas Fogwill
, Hein S. Venter
:
Selection and ranking of remote hosts for digital forensic investigation in a Cloud environment. ISSA 2013: 1-5 - [c43]Philip M. Trenwith, Hein S. Venter
:
Digital forensic readiness in the cloud. ISSA 2013: 1-5 - [c42]Aleksandar Valjarevic, Hein S. Venter
:
Implementation guidelines for a harmonised digital forensic investigation readiness process model. ISSA 2013: 1-9 - [c41]Hein S. Venter
, Marianne Loock
, Marijke Coetzee
:
Introduction. ISSA 2013: 1 - [e10]Hein S. Venter, Marianne Loock, Marijke Coetzee:
2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013. IEEE 2013, ISBN 978-1-4799-0808-0 [contents] - 2012
- [j14]Enos K. Mabuto, Hein S. Venter:
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications. ISC Int. J. Inf. Secur. 4(2): 137-150 (2012) - [j13]Kamil Reddy, H. S. Venter
, Martin S. Olivier
:
Using time-driven activity-based costing to manage digital forensic readiness in large organisations. Inf. Syst. Frontiers 14(5): 1061-1077 (2012) - [j12]Ickin Vural, Hein S. Venter:
Combating Mobile Spam through Botnet Detection using Artificial Immune Systems. J. Univers. Comput. Sci. 18(6): 750-774 (2012) - [j11]Sipho Ngobeni, Hein S. Venter, Ivan Burke:
The Modelling of a Digital Forensic Readiness Approach for Wireless Local Area Networks. J. Univers. Comput. Sci. 18(12): 1721-1740 (2012) - [c40]Enos K. Mabuto, Hein S. Venter
:
User-generated digital forensic evidence in graphic design applications. CyberSec 2012: 195-200 - [c39]Francois Mouton, Mercia M. Malan, Hein S. Venter:
Development of Cognitive Functioning Psychological Measures for the SEADM. HAISA 2012: 40-51 - [c38]Franscois Van Staden, Hein S. Venter
:
Implementing Forensic Readiness Using Performance Monitoring Tools. IFIP Int. Conf. Digital Forensics 2012: 261-270 - [c37]Nickson M. Karie
, Hein S. Venter
:
Measuring semantic similarity between digital forensics terminologies using web search engines. ISSA 2012: 1-9 - [c36]George Sibiya
, Hein S. Venter
, Sipho Ngobeni, Thomas Fogwill
:
Guidelines for procedures of a harmonised digital forensic process in network forensics. ISSA 2012: 1-7 - [c35]Aleksandar Valjarevic, Hein S. Venter
:
Harmonised digital forensic investigation process model. ISSA 2012: 1-10 - [c34]Hein S. Venter
, Marianne Loock
, Marijke Coetzee
:
Introduction. ISSA 2012: 1 - [c33]Enos Kudakwashe Mabuto, Hein S. Venter:
Finding Digital Forensic Evidence in Graphic Design Applications. WDFIA 2012: 12-26 - [c32]Aleksandar Valjarevic, Hein S. Venter:
Towards Solving the Identity Challenge faced by Digital Forensics. WDFIA 2012: 129-138 - [e9]Hein S. Venter, Marianne Loock, Marijke Coetzee:
2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012. IEEE 2012, ISBN 978-1-4673-2160-0 [contents] - 2011
- [j10]Martin S. Olivier, Jan H. P. Eloff, Hein S. Venter, Mariette E. Botes:
Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities. South Afr. Comput. J. 47: 47-57 (2011) - [c31]Francois Mouton
, H. S. Venter
:
A prototype for achieving digital forensic readiness on wireless sensor networks. AFRICON 2011: 1-6 - [c30]Moses Dlamini, Mariki M. Eloff, Jan H. P. Eloff, Hein S. Venter:
A Budget Model for Information Security. HAISA 2011: 47-57 - [c29]Ickin Vural, Hein S. Venter:
Detecting Mobile Spam Botnets Using Artificial immune Systems. IFIP Int. Conf. Digital Forensics 2011: 183-192 - [c28]Enos K. Mabuto, Hein S. Venter:
State of the Art of Digital Forensic Techniques. ISSA 2011 - [c27]Stephen Serra, Hein S. Venter:
Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness. ISSA 2011 - [c26]Franscois Van Staden, Hein S. Venter:
Adding digital forensic readiness to electronic communication using a security monitoring tool. ISSA 2011 - [c25]Aleksandar Valjarevic, Hein S. Venter:
Towards a Digital Forensics Readiness Framework for Public Key Infrastructure Systems. ISSA 2011 - [c24]Francois Mouton, Hein S. Venter:
Requirements for wireless sensor networks in order to achieve digital forensic readiness. WDFIA 2011: 108-121 - [e8]Hein S. Venter, Marijke Coetzee, Marianne Loock:
Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings ISSA 2011. ISSA, Pretoria, South Africa 2011, ISBN 978-1-4577-1482-5 [contents] - 2010
- [j9]A. Maciej Rossudowski, Hein S. Venter
, Jan H. P. Eloff, Derrick G. Kourie:
A security privacy aware architecture and protocol for a single smart card used for multiple services. Comput. Secur. 29(4): 393-409 (2010) - [c23]Ickin Vural, Hein S. Venter
:
Mobile Botnet Detection Using Network Forensics. FIS 2010: 57-67 - [c22]Sipho Ngobeni, Hein S. Venter
, Ivan Burke:
A Forensic Readiness Model for Wireless Networks. IFIP Int. Conf. Digital Forensics 2010: 107-117 - [c21]Monique Bezuidenhout, Francois Mouton, Hein S. Venter:
Social Engineering Attack Detection Model: SEADM. ISSA 2010 - [c20]Francois Ruan Van Staden, Hein S. Venter:
Adding digital forensic readiness to the email trace header. ISSA 2010 - [c19]Ickin Vural, Hein S. Venter:
Using Network Forensics and Artificial Intelligence Techniques to Detect Bot-nets on an Organizational Network. ITNG 2010: 725-731 - [c18]Kamil Reddy, Hein S. Venter
:
Information Privacy in Two Dimensions - Towards a Classification Scheme for Information Privacy Research. SocialCom/PASSAT 2010: 973-980 - [e7]Hein S. Venter, Marijke Coetzee, Marianne Loock:
Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings ISSA 2010. ISSA, Pretoria, South Africa 2010, ISBN 978-1-4244-5494-5 [contents]
2000 – 2009
- 2009
- [c17]Kamil Reddy, Hein S. Venter:
A Forensic Framework for Handling Information Privacy Incidents. IFIP Int. Conf. Digital Forensics 2009: 143-155 - [c16]Sipho Josia Ngobeni, Hein S. Venter:
The Design of a Wireless Forensic Readiness Model(WFRM). ISSA 2009: 35-52 - [c15]Ickin Vural, Hein S. Venter:
Investigating Identity Concealing and Email Tracing Techniques. ISSA 2009: 293-308 - [c14]Franscois Van Staden, Hein S. Venter:
The State of the Art of Spam and Anti-Spam Strategies and a Possible Solution using Digital Forensics. ISSA 2009: 437-454 - [c13]Kamil Reddy, Hein S. Venter
:
Using Object-Oriented Concepts to Develop a High-Level Information Privacy Risk Management Model. SECURWARE 2009: 23-30 - [e6]Hein S. Venter, Marijke Coetzee, Les Labuschagne:
Information Security South Africa Conference 2009, School of Tourism & Hospitality, University of Johannesburg, Johannesburg, South Africa, July 6-8, 2009. Proceedings ISSA2009. ISSA, Pretoria, South Africa 2009, ISBN 978-1-86854-740-1 [contents] - 2008
- [j8]Hein S. Venter
, Jan H. P. Eloff, Y. L. Li:
Standardising vulnerability categories. Comput. Secur. 27(3-4): 71-83 (2008) - [c12]Kweku Kwakye Arthur, Martin S. Olivier
, Hein S. Venter
, Jan H. P. Eloff:
Considerations Towards a Cyber Crime Profiling System. ARES 2008: 1388-1393 - [c11]Kamil Reddy, H. S. Venter
, Martin S. Olivier
, Iain Currie:
Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. PST 2008: 56-64 - [e5]Hein S. Venter, Mariki M. Eloff, Jan H. P. Eloff, Les Labuschagne:
Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008. ISSA, Pretoria, South Africa 2008, ISBN 978-1-86854-693-0 [contents] - 2007
- [c10]Kweku Kwakye Arthur, Martin S. Olivier
, Hein S. Venter
:
Applying The Biba Integrity Model to Evidence Management. IFIP Int. Conf. Digital Forensics 2007: 317-327 - [c9]Tim J. Grant, H. S. Venter
, Jan H. P. Eloff:
Simulating adversarial interactions between intruders and system administrators using OODA-RR. SAICSIT 2007: 46-55 - [c8]A. Maciej Rossudowski, Hein S. Venter
, Jan H. P. Eloff:
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. SEC 2007: 217-228 - [e4]Hein S. Venter, Mariki M. Eloff, Les Labuschagne, Jan H. P. Eloff, Rossouw von Solms:
New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa. IFIP 232, Springer 2007, ISBN 978-0-387-72366-2 [contents] - 2006
- [c7]Marika Wojcik, Hein S. Venter, Jan H. P. Eloff, Martin S. Olivier:
Applying Machine Trust Models to Forensic Investigations. IFIP Int. Conf. Digital Forensics 2006: 55-65 - [c6]Bennie Fei, Jan H. P. Eloff, Martin S. Olivier, Hein S. Venter:
Analysis of Web Proxy Logs. IFIP Int. Conf. Digital Forensics 2006: 247-258 - [c5]Marika Wojcik, Jan H. P. Eloff, H. S. Venter:
Trust Model Architecture: Defining Prejudice by Learning. TrustBus 2006: 182-191 - [e3]Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter:
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa. ISSA, Pretoria, South Africa 2006, ISBN 1-86854-636-5 [contents] - 2005
- [c4]Rut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter:
Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. IFIP Int. Conf. Digital Forensics 2005: 105-112 - [c3]Bennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier:
Exploring Forensic Data with Self-Organizing Maps. IFIP Int. Conf. Digital Forensics 2005: 113-123 - [e2]Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter:
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa. ISSA, Pretoria, South Africa 2005, ISBN 1-86854-625-X [contents] - 2004
- [j7]H. S. Venter
, Jan H. P. Eloff:
Vulnerability forecasting - a conceptual model. Comput. Secur. 23(6): 489-497 (2004) - [j6]Hein S. Venter
, Martin S. Olivier
, Jan H. P. Eloff:
PIDS: a privacy intrusion detection system. Internet Res. 14(5): 360-365 (2004) - [e1]Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter:
Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa. ISSA, Pretoria, South Africa 2004, ISBN 1-86854-522-9 [contents] - 2003
- [j5]H. S. Venter
, Jan H. P. Eloff:
A taxonomy for information security technologies. Comput. Secur. 22(4): 299-307 (2003) - [j4]H. S. Venter, Jan H. P. Eloff:
Evaluating vulnerability scanners using harmonised vulnerability categories. South Afr. Comput. J. 31: 40-45 (2003) - 2002
- [j3]H. S. Venter
, Jan H. P. Eloff:
Vulnerabilities categories for intrusion detection system. Comput. Secur. 21(7): 617-619 (2002) - [j2]H. S. Venter, Jan H. P. Eloff:
Harmonising vulnerability categories. South Afr. Comput. J. 29: 24-31 (2002) - [c2]Hein S. Venter:
Comparing Intrusion Detection Tools using Generic Vulnerability Categories. ISSA 2002: 1-18
1990 – 1999
- 1999
- [c1]H. S. Venter, Les Labuschagne, Jan H. P. Eloff:
Real-time Risk Analysis on the Internet: a prototype. Conference on Information Security Management & Small Systems Security 1999: 11-28 - 1998
- [j1]H. S. Venter
, Jan H. P. Eloff:
Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools. Comput. Secur. 17(8): 683-692 (1998)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint