Follow
Louise Leenen
Title
Cited by
Cited by
Year
Social engineering attack examples, templates and scenarios
F Mouton, L Leenen, HS Venter
Computers & Security 59, 186-209, 2016
2152016
Social engineering attack framework
F Mouton, MM Malan, L Leenen, HS Venter
2014 Information Security for South Africa, 1-9, 2014
1072014
Towards an ontological model defining the social engineering domain
F Mouton, L Leenen, MM Malan, HS Venter
IFIP International Conference on Human Choice and Computers, 266-279, 2014
1002014
Social engineering attack detection model: Seadmv2
F Mouton, L Leenen, HS Venter
2015 International Conference on Cyberworlds (CW), 216-223, 2015
402015
Ant colony induced decision trees for intrusion detection
FH Botes, L Leenen, R De La Harpe
16th European Conference on Cyber Warfare and Security, 53-62, 2017
322017
A computer network attack taxonomy and ontology
RP Van Heerden, B Irwin, ID Burke, L Leenen
International Journal of Cyber Warfare and Terrorism (IJCWT) 2 (3), 12-25, 2012
272012
Implementation of a cyber security policy in South Africa: Reflection on progress and the way forward
M Grobler, JJ Vuuren, L Leenen
IFIP International Conference on Human Choice and Computers, 215-225, 2012
262012
Systematic withdrawal
T Meyer, J Heidema, W Labuschagne, L Leenen
Journal of Philosophical Logic 31 (5), 415-443, 2002
252002
Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa
JJ van Vuuren, L Leenen, J Zaaiman
9th International Conference on Cyber Warfare and Security, 107-115, 2014
182014
Finite state machine for the social engineering attack detection model: SEADM
F Mouton, A Nottingham, L Leenen, HS Venter
SAIEE Africa Research Journal 109 (2), 133-148, 2018
152018
Automated classification of computer network attacks
R van Heerden, L Leenen, B Irwin
2013 International Conference on Adaptive Science and Technology, 1-7, 2013
152013
Artificial intelligence and big data analytics in support of cyber defense
L Leenen, T Meyer
Research Anthology on Artificial Intelligence Applications in Security, 1738 …, 2021
142021
14 A Constraint Programming Solution for the Military Unit Path Finding Problem
L Leenen, A Terlunen, H Le Roux
Mobile Intelligent Autonomous Systems, 225, 2016
132016
Modeling and solving semiring constraint satisfaction problems by transformation to weighted semiring Max-SAT
L Leenen, A Anbulagan, T Meyer, A Ghose
Australasian Joint Conference on Artificial Intelligence, 202-212, 2007
132007
Relaxations of semiring constraint satisfaction problems
L Leenen, T Meyer, A Ghose
Information processing letters 103 (5), 177-182, 2007
112007
Underlying finite state machine for the social engineering attack detection model
F Mouton, A Nottingham, L Leenen, HS Venter
2017 Information Security for South Africa (ISSA), 98-105, 2017
102017
Using an ontology for network attack planning
R van Heerden, P Chan, L Leenen, J Theron
International Journal of Cyber Warfare and Terrorism (IJCWT) 6 (3), 65-78, 2016
92016
Social Engineering Attack Framework. 2014 Information Security for South Africa
F Mouton, MM Malan, L Leenen, HS Venter
IEEE, 2014
92014
A comparison of chat applications in terms of security and privacy
J Botha, WC Vant, L Leenen
Proc. 18th Eur. Conf. Cyber Warfare Secur., 55, 2019
82019
A constraint-based solver for the military unit path finding problem
L Leenen, J Vorster, H le Roux
Proceedings of the 2010 spring simulation multiconference, 1-8, 2010
82010
The system can't perform the operation now. Try again later.
Articles 1–20