HS Venter
HS Venter
Professor of Computer Science, University of Pretoria
Verified email at cs.up.ac.za
Title
Cited by
Cited by
Year
A taxonomy for information security technologies
HS Venter, JHP Eloff
Computers & Security 22 (4), 299-307, 2003
1562003
Social engineering attack examples, templates and scenarios
F Mouton, L Leenen, HS Venter
Computers & Security 59, 186-209, 2016
1522016
An approach to implement a network intrusion detection system using genetic algorithms
MM Pillai, JHP Eloff, HS Venter
Proceedings of the 2004 annual research conference of the South African …, 2004
1022004
Social engineering attack framework
F Mouton, MM Malan, L Leenen, HS Venter
2014 Information Security for South Africa, 1-9, 2014
842014
Harmonised digital forensic investigation process model
A Valjarevic, HS Venter
2012 Information Security for South Africa, 1-10, 2012
722012
Towards an ontological model defining the social engineering domain
F Mouton, L Leenen, MM Malan, HS Venter
IFIP International Conference on Human Choice and Computers, 266-279, 2014
712014
Social engineering attack detection model: Seadm
M Bezuidenhout, F Mouton, HS Venter
2010 Information Security for South Africa, 1-8, 2010
712010
Exploring forensic data with self-organizing maps
B Fei, J Eloff, H Venter, M Olivier
Ifip international conference on digital forensics, 113-123, 2005
692005
Exploring forensic data with self-organizing maps
B Fei, J Eloff, H Venter, M Olivier
Ifip international conference on digital forensics, 113-123, 2005
692005
Necessity for ethics in social engineering research
F Mouton, MM Malan, KK Kimppa, HS Venter
Computers & Security 55, 114-127, 2015
562015
Taxonomy of challenges for digital forensics
NM Karie, HS Venter
Journal of forensic sciences 60 (4), 885-893, 2015
562015
The use of self-organising maps for anomalous behaviour detection in a digital investigation
BKL Fei, JHP Eloff, MS Olivier, HS Venter
Forensic Science International 162 (1-3), 33-37, 2006
562006
A cloud forensic readiness model using a Botnet as a Service
VR Kebande, HS Venter
The international conference on digital security and forensics …, 2014
482014
Using time-driven activity-based costing to manage digital forensic readiness in large organisations
K Reddy, HS Venter, MS Olivier
Information Systems Frontiers 14 (5), 1061-1077, 2012
482012
Digital forensic framework for a cloud environment
G Sibiya, HS Venter, T Fogwill
International Information Management Corporation (IIMC), 2012
462012
The architecture of a digital forensic readiness management system
K Reddy, HS Venter
Computers & security 32, 73-89, 2013
442013
Mobile botnet detection using network forensics
I Vural, H Venter
Future Internet Symposium, 57-67, 2010
432010
A comprehensive and harmonized digital forensic investigation process model
A Valjarevic, HS Venter
Journal of forensic sciences 60 (6), 1467-1483, 2015
412015
Digital forensic readiness in the cloud
PM Trenwith, HS Venter
2013 Information Security for South Africa, 1-5, 2013
392013
Testing the harmonised digital forensic investigation process model-using an Android mobile phone
S Omeleze, HS Venter
2013 Information Security for South Africa, 1-8, 2013
362013
The system can't perform the operation now. Try again later.
Articles 1–20