Renier van Heerden
Renier van Heerden
CSIR, Pretoria
Verified email at csir.co.za
Title
Cited by
Cited by
Year
Classifying network attack scenarios using an Ontology
RP van Heerden, B Irwin, I Burke
Proceedings of the 7th International Conference on Information-Warfare …, 2012
302012
Formal comments on the integrated resource plan (IRP) update assumptions, base case and observations 2016
JG Wright, JR Calitz, PR Van Heerden, ST Bischof-Niemz, C Mushwana, ...
272017
A computer network attack taxonomy and ontology
RP Van Heerden, B Irwin, ID Burke, L Leenen
International Journal of Cyber Warfare and Terrorism (IJCWT) 2 (3), 12-25, 2012
232012
Automatic number plate segmentation and recognition
C Nieuwoudt, R Van Heerden
Seventh annual South African workshop on Pattern Recognition, 88-93, 1996
231996
System inertia and Rate of Change of Frequency (RoCoF) with increasing non-synchronous renewable energy penetration
GA Chown, JG Wright, RP Van Heerden, M Coker
202017
Formal comments on the Integrated Resource Plan (IRP) update assumptions, base case and observations
J Wright, T Bischof-Niemz, C Calitz, C Mushwana, R Van Heerden, ...
Council for Scientific and Industrial Research, Pretoria, 2017
152017
Comparing Models of Offensive Cyber Operations
T Grant, I Burke, R van Heerden
Proceedings of the 7th International Warfare and Security, 108-121, 2012
142012
Automated classification of computer network attacks
R van Heerden, L Leenen, B Irwin
2013 International Conference on Adaptive Science and Technology, 1-7, 2013
132013
Optimization of vehicle license plate segmentation and symbol recognition
RP Van Heerden, EC Botha
Department of Electrical, Electronic and Computer Engineering, University of …, 2010
132010
Optimization of vehicle license plate segmentation and symbol recognition
BEC van Heerden, R.P.
Twelfth Annual Symposium of the South African Pattern Recognition Association, 2001
13*2001
Reference architecture for android applications to support the detection of manipulated evidence
H Pieterse, MS Olivier, RP Van Heerden
SAIEE Africa Research Journal 107 (2), 92-103, 2016
122016
Classification of cyber attacks in South Africa
R Van Heerden, S Von Soms, R Mooi
2016 IST-Africa Week Conference, 1-16, 2016
122016
Playing hide-and-seek: Detecting the manipulation of Android Timestamps
H Pieterse, MS Olivier, RP van Heerden
Information Security for South Africa (ISSA), 2015
92015
Using an ontology for network attack planning
R van Heerden, P Chan, L Leenen, J Theron
International Journal of Cyber Warfare and Terrorism (IJCWT) 6 (3), 65-78, 2016
82016
Long-term electricity sector expansion planning: A unique opportunity for a least cost energy transition in South Africa
JG Wright, T Bischof-Niemz, JR Calitz, C Mushwana, R Van Heerden
Renewable Energy Focus 30, 21-45, 2019
72019
An overview of linux container based network emulation
S Peach, B Irwin, R van Heerden
15th European Conf. Cyber Warfare and Security, 253-259, 2016
72016
Mapping the most significant computer hacking events to a temporal computer attack model
R van Heerden, H Pieterse, B Irwin
IFIP International Conference on Human Choice and Computers, 226-236, 2012
72012
Using Markov Models to crack passwords
RP Van Heerden, JS Vorster
The 3rd International Conference on Information Warfare and Security: Peter …, 2008
72008
The consequences of Edward Snowden NSA related information disclosures
S von Solms, R Van Heerden
Proceedings of the 10th International Conference on Cyber Warfare and …, 2015
62015
Developing a virtualised testbed environment in preparation for testing of network based attacks
R van Heerden, H Pieterse, I Burke, B Irwin
2013 International Conference on Adaptive Science and Technology, 1-8, 2013
62013
The system can't perform the operation now. Try again later.
Articles 1–20