Francois Mouton
Francois Mouton
Noroff University College, University of the Western Cape
Verified email at noroff.no - Homepage
Title
Cited by
Cited by
Year
Social engineering attack examples, templates and scenarios
F Mouton, L Leenen, HS Venter
Computers & Security 59, 186-209, 2016
1542016
Social engineering attack framework
F Mouton, MM Malan, L Leenen, HS Venter
2014 Information Security for South Africa, 1-9, 2014
862014
Towards an ontological model defining the social engineering domain
F Mouton, L Leenen, MM Malan, HS Venter
IFIP International Conference on Human Choice and Computers, 266-279, 2014
732014
Social engineering attack detection model: SEADM
M Bezuidenhout, F Mouton, HS Venter
Information Security for South Africa (ISSA), 1-8, 2010
732010
Necessity for ethics in social engineering research
F Mouton, MM Malan, KK Kimppa, HS Venter
Computers & Security 55, 114-127, 2015
592015
A prototype for achieving digital forensic readiness on wireless sensor networks
F Mouton, HS Venter
AFRICON, 1-6, 2011
292011
Social engineering attack detection model: Seadmv2
F Mouton, L Leenen, HS Venter
2015 International Conference on Cyberworlds (CW), 216-223, 2015
282015
Social engineering from a normative ethics perspective
F Mouton, MM Malan, HS Venter
Information Security for South Africa (ISSA), 1-8, 2013
192013
Development of cognitive functioning psychological measures for the SEADM
F Mouton, MM Malan, HS Venter
Information Security for South Africa (ISSA), 1-12, 2012
182012
Benchmarking a mobile implementation of the social engineering prevention training tool
F Mouton, M Teixeira, T Meyer
Information Security for South Africa (ISSA), 2017, 106-116, 2017
122017
Finite state machine for the social engineering attack detection model: SEADM
F Mouton, A Nottingham, L Leenen, HS Venter
SAIEE Africa Research Journal 109 (2), 133-148, 2018
112018
COVID-19: Impact on the cyber security threat landscape
F Mouton, A De Coning
no. March, 2020
102020
Web defacement and intrusion monitoring tool: WDIMT
M Masango, F Mouton, P Antony, B Mangoale
2017 International Conference on Cyberworlds (CW), 72-79, 2017
92017
Underlying finite state machine for the social engineering attack detection model
F Mouton, A Nottingham, L Leenen, HS Venter
Information Security for South Africa (ISSA), 2017, 98-105, 2017
92017
Requirements for wireless sensor networks in order to achieve digital forensic readiness
F Mouton, HS Venter
6th International Workshop on Digital Forensics and Incident Analysis (WDFIA …, 2011
72011
SEADer++: social engineering attack detection in online environments using machine learning
M Lansley, F Mouton, S Kapetanakis, N Polatidis
Journal of Information and Telecommunication 4 (3), 346-362, 2020
52020
Social Engineering Attack Framework. 2014 Information Security for South Africa
F Mouton, MM Malan, L Leenen, HS Venter
Johannesburg, 2014
52014
A Secure Communication Protocol for Wireless Sensor Networks
F Mouton, HS Venter
Proceedings of the Annual Security Conference "Security Assurance and …, 2009
42009
Context aware mobile application for mobile devices
M Masango, F Mouton, A Nottingham, J Mtsweni
2016 Information Security for South Africa (ISSA), 85-90, 2016
32016
System dynamics modelling to investigate the cost-benefit of cyber security investment
R Oosthuizen, MM Molekoa, F Mouton
22018
The system can't perform the operation now. Try again later.
Articles 1–20