Johannes S. Vorster
Cited by
Cited by
Major security incidents since 2014: An African perspective
R Van Heerden, S Von Solms, J Vorster
2018 IST-Africa Week Conference (IST-Africa), Page 1 of 11-Page 11 of 11, 2018
A constraint-based solver for the military unit path finding problem
L Leenen, JS Vorster, H le Roux
Proceedings of the 2010 Spring Simulation Multiconference, 25, 2010
Using Markov Models to crack passwords
RP van Heerden, JS Vorster
The 3rd International Conference on Information Warfare and Security: Peter …, 2008
Statistical analysis of large passwords lists, used to optimize brute force attacks
RP Van Heerden, JS Vorster
Proceedings of the 4th International Conference On Information Warfare and …, 2009
Heuristic Attacks against graphical password generators
S Peach, JS Vorster, RP Van Heerden
Proceedings of the South African Information Security Multi-Conference …, 2010
The Pattern-richness of Graphical Passwords
JS Vorster, RP van Heerden, B Irwin
Proceedings of the 15th International Information Security South Africa …, 2016
Graphical Passwords: A Qualitative Study of Password Patterns
JS Vorster, RP van Heerden
The Proceedings of the 10th International Conference on Cyber Warfare and …, 2015
A Framework for the Implementation of Graphical Passwords
JS Vorster
M.Sc., University of Liverpool, 2014
Network mapping and usage determination
FP Senekal, JS Vorster
Military Information Communications Simposium South Africa 2007, Pretoria …, 2007
A Study of Perceptions of Graphical Passwords
JS Vorster, RP Van Heerden
The Journal of Information Warfare 14 (3), 2015
Applying data-mining techniques in honeypot analysis
N Veerasamy, PM Mokhonoana, JS Vorster
Information Security South Africa Conference (ISSA2006),1-5 July 2006, 2006
Violations of good security practices in graphical passwords schemes: Enterprise constraints on scheme-design
JS Vorster, B Irwin, RP Van Heerden
Proceedings of the 13th International Conference on Cyber Warfare and …, 2018
Implementing Honeypots as Part of a Simple Cost Effective Wireless Intrusion Detection System
HM Velupillai, RP van Heerden, JS Vorster
Southern African Telecommunications Networks and Applications Conference …, 2007
Information Warfare: An Information Manamgement Perspective
JS Vorster, R Van Heerden
IFIP TC9 Proceedings on ICT uses in Warfare and the Safeguarding of Peace, 76-83, 2008
Statistical Analysis of Popular Passwords
R van Heerden, JS Vorster
IFIP TC9 Proceedings on ICT uses in Warfare and the Safeguarding of Peace …, 2008
An innovative numerical algorithm for the calculation of intermittent building thermal loads
PG Rousseau, JS Vorster, EH Mathews
9th International Conference on Numerical Methods in Thermal Problems 9 (2 …, 1995
Journal of Information Warfare
BVW Irwin, T Nkhumeleni, M Aschmann, JJ van Vuuren, L Leenen, ...
Astronomical Maser Modelling
JS Vorster
The system can't perform the operation now. Try again later.
Articles 1–18