HS Venter
HS Venter
Professor of Computer Science, University of Pretoria
Verified email at cs.up.ac.za
Title
Cited by
Cited by
Year
A taxonomy for information security technologies
HS Venter, JHP Eloff
Computers & Security 22 (4), 299-307, 2003
1562003
Social engineering attack examples, templates and scenarios
F Mouton, L Leenen, HS Venter
Computers & Security 59, 186-209, 2016
1542016
An approach to implement a network intrusion detection system using genetic algorithms
MM Pillai, JHP Eloff, HS Venter
Proceedings of the 2004 annual research conference of the South African …, 2004
1022004
Social engineering attack framework
F Mouton, MM Malan, L Leenen, HS Venter
2014 Information Security for South Africa, 1-9, 2014
862014
Towards an ontological model defining the social engineering domain
F Mouton, L Leenen, MM Malan, HS Venter
IFIP International Conference on Human Choice and Computers, 266-279, 2014
732014
Social engineering attack detection model: Seadm
M Bezuidenhout, F Mouton, HS Venter
2010 Information Security for South Africa, 1-8, 2010
732010
Harmonised digital forensic investigation process model
A Valjarevic, HS Venter
2012 Information Security for South Africa, 1-10, 2012
722012
Exploring forensic data with self-organizing maps
B Fei, J Eloff, H Venter, M Olivier
Ifip international conference on digital forensics, 113-123, 2005
692005
Exploring forensic data with self-organizing maps
B Fei, J Eloff, H Venter, M Olivier
Ifip international conference on digital forensics, 113-123, 2005
692005
Necessity for ethics in social engineering research
F Mouton, MM Malan, KK Kimppa, HS Venter
Computers & Security 55, 114-127, 2015
592015
Taxonomy of challenges for digital forensics
NM Karie, HS Venter
Journal of forensic sciences 60 (4), 885-893, 2015
582015
The use of self-organising maps for anomalous behaviour detection in a digital investigation
BKL Fei, JHP Eloff, MS Olivier, HS Venter
Forensic Science International 162 (1-3), 33-37, 2006
562006
Using time-driven activity-based costing to manage digital forensic readiness in large organisations
K Reddy, HS Venter, MS Olivier
Information Systems Frontiers 14 (5), 1061-1077, 2012
492012
A cloud forensic readiness model using a Botnet as a Service
VR Kebande, HS Venter
The international conference on digital security and forensics …, 2014
482014
Digital forensic framework for a cloud environment
G Sibiya, HS Venter, T Fogwill
International Information Management Corporation (IIMC), 2012
462012
Mobile botnet detection using network forensics
I Vural, H Venter
Future Internet Symposium, 57-67, 2010
452010
The architecture of a digital forensic readiness management system
K Reddy, HS Venter
Computers & security 32, 73-89, 2013
442013
A comprehensive and harmonized digital forensic investigation process model
A Valjarevic, HS Venter
Journal of forensic sciences 60 (6), 1467-1483, 2015
412015
Digital forensic readiness in the cloud
PM Trenwith, HS Venter
2013 Information Security for South Africa, 1-5, 2013
412013
Testing the harmonised digital forensic investigation process model-using an Android mobile phone
S Omeleze, HS Venter
2013 Information Security for South Africa, 1-8, 2013
362013
The system can't perform the operation now. Try again later.
Articles 1–20