Follow
Francois Mouton
Francois Mouton
Noroff University College, University of the Western Cape
Verified email at noroff.no - Homepage
Title
Cited by
Cited by
Year
Social engineering attack examples, templates and scenarios
F Mouton, L Leenen, HS Venter
Computers & Security 59, 186-209, 2016
2092016
Social engineering attack framework
F Mouton, MM Malan, L Leenen, HS Venter
2014 Information Security for South Africa, 1-9, 2014
1152014
Towards an ontological model defining the social engineering domain
F Mouton, L Leenen, MM Malan, HS Venter
IFIP International Conference on Human Choice and Computers, 266-279, 2014
952014
Social engineering attack detection model: SEADM
M Bezuidenhout, F Mouton, HS Venter
Information Security for South Africa (ISSA), 1-8, 2010
892010
Necessity for ethics in social engineering research
F Mouton, MM Malan, KK Kimppa, HS Venter
Computers & Security 55, 114-127, 2015
752015
Social engineering attack detection model: Seadmv2
F Mouton, L Leenen, HS Venter
2015 International Conference on Cyberworlds (CW), 216-223, 2015
392015
A prototype for achieving digital forensic readiness on wireless sensor networks
F Mouton, HS Venter
AFRICON, 1-6, 2011
312011
Social engineering from a normative ethics perspective
F Mouton, MM Malan, HS Venter
Information Security for South Africa (ISSA), 1-8, 2013
222013
Development of cognitive functioning psychological measures for the SEADM
F Mouton, MM Malan, HS Venter
Information Security for South Africa (ISSA), 1-12, 2012
202012
SEADer++: social engineering attack detection in online environments using machine learning
M Lansley, F Mouton, S Kapetanakis, N Polatidis
Journal of Information and Telecommunication 4 (3), 346-362, 2020
172020
COVID-19: Impact on the cyber security threat landscape
F Mouton, A de Coning
Project: Social Engineering: Defining the field from Both an Attack and …, 2020
162020
Finite state machine for the social engineering attack detection model: SEADM
F Mouton, A Nottingham, L Leenen, HS Venter
SAIEE Africa Research Journal 109 (2), 133-148, 2018
152018
Benchmarking a mobile implementation of the social engineering prevention training tool
F Mouton, M Teixeira, T Meyer
Information Security for South Africa (ISSA), 2017, 106-116, 2017
142017
Underlying finite state machine for the social engineering attack detection model
F Mouton, A Nottingham, L Leenen, HS Venter
Information Security for South Africa (ISSA), 2017, 98-105, 2017
102017
Web defacement and intrusion monitoring tool: Wdimt
M Masango, F Mouton, P Antony, B Mangoale
2017 International Conference on Cyberworlds (CW), 72-79, 2017
82017
Requirements for wireless sensor networks in order to achieve digital forensic readiness
F Mouton, HS Venter
6th International Workshop on Digital Forensics and Incident Analysis (WDFIA …, 2011
72011
Context aware mobile application for mobile devices
M Masango, F Mouton, A Nottingham, J Mtsweni
2016 Information Security for South Africa (ISSA), 85-90, 2016
42016
A Secure Communication Protocol for Wireless Sensor Networks
F Mouton, HS Venter
Proceedings of the Annual Security Conference "Security Assurance and …, 2009
42009
An approach for detecting web defacement with self-healing capabilities
M Masango, F Mouton, P Antony, B Mangoale
Transactions on Computational Science XXXII, 29-42, 2018
32018
System dynamics modelling to investigate the cost-benefit of cyber security investment
R Oosthuizen, MM Molekoa, F Mouton
22018
The system can't perform the operation now. Try again later.
Articles 1–20