Follow
Johannes S. Vorster
Title
Cited by
Cited by
Year
Major security incidents since 2014: An African perspective
R Van Heerden, S Von Solms, J Vorster
2018 IST-Africa Week Conference (IST-Africa), Page 1 of 11-Page 11 of 11, 2018
82018
A constraint-based solver for the military unit path finding problem
L Leenen, JS Vorster, H le Roux
Proceedings of the 2010 Spring Simulation Multiconference, 25, 2010
82010
Using Markov Models to crack passwords
RP van Heerden, JS Vorster
The 3rd International Conference on Information Warfare and Security: Peter …, 2008
82008
Statistical analysis of large passwords lists, used to optimize brute force attacks
RP Van Heerden, JS Vorster
Proceedings of the 4th International Conference On Information Warfare and …, 2009
72009
Heuristic Attacks against graphical password generators
S Peach, JS Vorster, RP Van Heerden
Proceedings of the South African Information Security Multi-Conference …, 2010
62010
The Pattern-richness of Graphical Passwords
JS Vorster, RP van Heerden, B Irwin
Proceedings of the 15th International Information Security South Africa …, 2016
42016
Graphical Passwords: A Qualitative Study of Password Patterns
JS Vorster, RP van Heerden
The Proceedings of the 10th International Conference on Cyber Warfare and …, 2015
42015
A Framework for the Implementation of Graphical Passwords
JS Vorster
M.Sc., University of Liverpool, 2014
42014
Network mapping and usage determination
FP Senekal, JS Vorster
Military Information Communications Simposium South Africa 2007, Pretoria …, 2007
42007
A Study of Perceptions of Graphical Passwords
JS Vorster, RP Van Heerden
The Journal of Information Warfare 14 (3), 2015
32015
Applying data-mining techniques in honeypot analysis
N Veerasamy, PM Mokhonoana, JS Vorster
Information Security South Africa Conference (ISSA2006),1-5 July 2006, 2006
22006
Violations of good security practices in graphical passwords schemes: Enterprise constraints on scheme-design
JS Vorster, B Irwin, RP Van Heerden
Proceedings of the 13th International Conference on Cyber Warfare and …, 2018
12018
Implementing Honeypots as Part of a Simple Cost Effective Wireless Intrusion Detection System
HM Velupillai, RP van Heerden, JS Vorster
Southern African Telecommunications Networks and Applications Conference …, 2007
12007
Information Warfare: An Information Manamgement Perspective
JS Vorster, R Van Heerden
IFIP TC9 Proceedings on ICT uses in Warfare and the Safeguarding of Peace, 76-83, 2008
2008
Statistical Analysis of Popular Passwords
R van Heerden, JS Vorster
IFIP TC9 Proceedings on ICT uses in Warfare and the Safeguarding of Peace …, 2008
2008
An innovative numerical algorithm for the calculation of intermittent building thermal loads
PG Rousseau, JS Vorster, EH Mathews
9th International Conference on Numerical Methods in Thermal Problems 9 (2 …, 1995
1995
Journal of Information Warfare
BVW Irwin, T Nkhumeleni, M Aschmann, JJ van Vuuren, L Leenen, ...
Astronomical Maser Modelling
JS Vorster
The system can't perform the operation now. Try again later.
Articles 1–18