Search the dblp DataBase
H. S. Venter :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
H. S. Venter , Les Labuschagne , Jan H. P. Eloff Real-time Risk Analysis on the Internet: a prototype. [Citation Graph (0, 0)][DBLP ] Conference on Information Security Management & Small Systems Security, 1999, pp:11-28 [Conf ] Bennie Fei , Jan H. P. Eloff , H. S. Venter , Martin S. Olivier Exploring Forensic Data with Self-Organizing Maps. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:113-123 [Conf ] Rut Laubscher , Cobus Rabe , Martin S. Olivier , Jan H. P. Eloff , H. S. Venter Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:105-112 [Conf ] M. Wojcik , Jan H. P. Eloff , H. S. Venter Trust Model Architecture: Defining Prejudice by Learning. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:182-191 [Conf ] H. S. Venter , Jan H. P. Eloff Vulnerabilities categories for intrusion detection system. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:7, pp:617-619 [Journal ] H. S. Venter , Jan H. P. Eloff A taxonomy for information security technologies. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:4, pp:299-307 [Journal ] H. S. Venter , Jan H. P. Eloff Vulnerability forecasting - a conceptual model. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:6, pp:489-497 [Journal ] H. S. Venter , Jan H. P. Eloff Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:8, pp:683-692 [Journal ] H. S. Venter , Jan H. P. Eloff Harmonising vulnerability categories. [Citation Graph (0, 0)][DBLP ] South African Computer Journal, 2002, v:29, n:, pp:24-31 [Journal ] H. S. Venter , Jan H. P. Eloff Evaluating vulnerability scanners using harmonised vulnerability categories. [Citation Graph (0, 0)][DBLP ] South African Computer Journal, 2003, v:31, n:, pp:40-45 [Journal ] Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. [Citation Graph (, )][DBLP ] Simulating adversarial interactions between intruders and system administrators using OODA-RR. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs