HS Venter
HS Venter
Professor and HoD of Computer Science, University of Pretoria
Verified email at cs.up.ac.za
Cited by
Cited by
Social engineering attack examples, templates and scenarios
F Mouton, L Leenen, HS Venter
Computers & Security 59, 186-209, 2016
A taxonomy for information security technologies
HS Venter, JHP Eloff
Computers & Security 22 (4), 299-307, 2003
An approach to implement a network intrusion detection system using genetic algorithms
MM Pillai, JHP Eloff, HS Venter
Proceedings of the 2004 annual research conference of the South African …, 2004
Social engineering attack framework
F Mouton, MM Malan, L Leenen, HS Venter
2014 Information Security for South Africa, 1-9, 2014
Social engineering attack detection model: Seadm
M Bezuidenhout, F Mouton, HS Venter
2010 Information Security for South Africa, 1-8, 2010
Harmonised digital forensic investigation process model
A Valjarevic, HS Venter
2012 Information Security for South Africa, 1-10, 2012
Towards an ontological model defining the social engineering domain
F Mouton, L Leenen, MM Malan, HS Venter
IFIP International Conference on Human Choice and Computers, 266-279, 2014
Exploring forensic data with self-organizing maps
B Fei, J Eloff, H Venter, M Olivier
Ifip international conference on digital forensics, 113-123, 2005
Exploring forensic data with self-organizing maps
B Fei, J Eloff, H Venter, M Olivier
Ifip international conference on digital forensics, 113-123, 2005
Necessity for ethics in social engineering research
F Mouton, MM Malan, KK Kimppa, HS Venter
Computers & Security 55, 114-127, 2015
Taxonomy of challenges for digital forensics
NM Karie, HS Venter
Journal of forensic sciences 60 (4), 885-893, 2015
The use of self-organising maps for anomalous behaviour detection in a digital investigation
BKL Fei, JHP Eloff, MS Olivier, HS Venter
Forensic Science International 162 (1-3), 33-37, 2006
A cloud forensic readiness model using a Botnet as a Service
VR Kebande, HS Venter
The international conference on digital security and forensics …, 2014
Using time-driven activity-based costing to manage digital forensic readiness in large organisations
K Reddy, HS Venter, MS Olivier
Information Systems Frontiers 14 (5), 1061-1077, 2012
Mobile botnet detection using network forensics
I Vural, H Venter
Future Internet Symposium, 57-67, 2010
Digital forensic framework for a cloud environment
G Sibiya, HS Venter, T Fogwill
International Information Management Corporation (IIMC), 2012
Novel digital forensic readiness technique in the cloud environment
VR Kebande, HS Venter
Australian Journal of Forensic Sciences 50 (5), 552-591, 2018
The architecture of a digital forensic readiness management system
K Reddy, HS Venter
Computers & security 32, 73-89, 2013
Digital forensic readiness in the cloud
PM Trenwith, HS Venter
2013 Information Security for South Africa, 1-5, 2013
Diverging deep learning cognitive computing techniques into cyber forensics
NM Karie, VR Kebande, HS Venter
Forensic Science International: Synergy 1, 61-67, 2019
The system can't perform the operation now. Try again later.
Articles 1–20