Major security incidents since 2014: An African perspective R Van Heerden, S Von Solms, J Vorster 2018 IST-Africa Week Conference (IST-Africa), Page 1 of 11-Page 11 of 11, 2018 | 8 | 2018 |
A constraint-based solver for the military unit path finding problem L Leenen, JS Vorster, H le Roux Proceedings of the 2010 Spring Simulation Multiconference, 25, 2010 | 8 | 2010 |
Using Markov Models to crack passwords RP van Heerden, JS Vorster The 3rd International Conference on Information Warfare and Security: Peter …, 2008 | 8 | 2008 |
Statistical analysis of large passwords lists, used to optimize brute force attacks RP Van Heerden, JS Vorster Proceedings of the 4th International Conference On Information Warfare and …, 2009 | 7 | 2009 |
Heuristic Attacks against graphical password generators S Peach, JS Vorster, RP Van Heerden Proceedings of the South African Information Security Multi-Conference …, 2010 | 6 | 2010 |
The Pattern-richness of Graphical Passwords JS Vorster, RP van Heerden, B Irwin Proceedings of the 15th International Information Security South Africa …, 2016 | 4 | 2016 |
Graphical Passwords: A Qualitative Study of Password Patterns JS Vorster, RP van Heerden The Proceedings of the 10th International Conference on Cyber Warfare and …, 2015 | 4 | 2015 |
A Framework for the Implementation of Graphical Passwords JS Vorster M.Sc., University of Liverpool, 2014 | 4 | 2014 |
Network mapping and usage determination FP Senekal, JS Vorster Military Information Communications Simposium South Africa 2007, Pretoria …, 2007 | 4 | 2007 |
A Study of Perceptions of Graphical Passwords JS Vorster, RP Van Heerden The Journal of Information Warfare 14 (3), 2015 | 3 | 2015 |
Applying data-mining techniques in honeypot analysis N Veerasamy, PM Mokhonoana, JS Vorster Information Security South Africa Conference (ISSA2006),1-5 July 2006, 2006 | 2 | 2006 |
Violations of good security practices in graphical passwords schemes: Enterprise constraints on scheme-design JS Vorster, B Irwin, RP Van Heerden Proceedings of the 13th International Conference on Cyber Warfare and …, 2018 | 1 | 2018 |
Implementing Honeypots as Part of a Simple Cost Effective Wireless Intrusion Detection System HM Velupillai, RP van Heerden, JS Vorster Southern African Telecommunications Networks and Applications Conference …, 2007 | 1 | 2007 |
Information Warfare: An Information Manamgement Perspective JS Vorster, R Van Heerden IFIP TC9 Proceedings on ICT uses in Warfare and the Safeguarding of Peace, 76-83, 2008 | | 2008 |
Statistical Analysis of Popular Passwords R van Heerden, JS Vorster IFIP TC9 Proceedings on ICT uses in Warfare and the Safeguarding of Peace …, 2008 | | 2008 |
An innovative numerical algorithm for the calculation of intermittent building thermal loads PG Rousseau, JS Vorster, EH Mathews 9th International Conference on Numerical Methods in Thermal Problems 9 (2 …, 1995 | | 1995 |
Journal of Information Warfare BVW Irwin, T Nkhumeleni, M Aschmann, JJ van Vuuren, L Leenen, ... | | |
Astronomical Maser Modelling JS Vorster | | |