The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

H. S. Venter: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. H. S. Venter, Les Labuschagne, Jan H. P. Eloff
    Real-time Risk Analysis on the Internet: a prototype. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:11-28 [Conf]
  2. Bennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier
    Exploring Forensic Data with Self-Organizing Maps. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:113-123 [Conf]
  3. Rut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter
    Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:105-112 [Conf]
  4. M. Wojcik, Jan H. P. Eloff, H. S. Venter
    Trust Model Architecture: Defining Prejudice by Learning. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:182-191 [Conf]
  5. H. S. Venter, Jan H. P. Eloff
    Vulnerabilities categories for intrusion detection system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:7, pp:617-619 [Journal]
  6. H. S. Venter, Jan H. P. Eloff
    A taxonomy for information security technologies. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:4, pp:299-307 [Journal]
  7. H. S. Venter, Jan H. P. Eloff
    Vulnerability forecasting - a conceptual model. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:6, pp:489-497 [Journal]
  8. H. S. Venter, Jan H. P. Eloff
    Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:8, pp:683-692 [Journal]
  9. H. S. Venter, Jan H. P. Eloff
    Harmonising vulnerability categories. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2002, v:29, n:, pp:24-31 [Journal]
  10. H. S. Venter, Jan H. P. Eloff
    Evaluating vulnerability scanners using harmonised vulnerability categories. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2003, v:31, n:, pp:40-45 [Journal]

  11. Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. [Citation Graph (, )][DBLP]


  12. Simulating adversarial interactions between intruders and system administrators using OODA-RR. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002