关注
Renier van Heerden
Renier van Heerden
CSIR, Pretoria
在 csir.co.za 的电子邮件经过验证
标题
引用次数
引用次数
年份
System inertia and Rate of Change of Frequency (RoCoF) with increasing non-synchronous renewable energy penetration
GA Chown, JG Wright, RP Van Heerden, M Coker
482017
Classifying network attack scenarios using an ontology
RP Van Heerden, B Irwin, I Burke
Proceedings of the 7th International Conference on Information-Warfare …, 2012
412012
A computer network attack taxonomy and ontology
RP Van Heerden, B Irwin, ID Burke, L Leenen
International Journal of Cyber Warfare and Terrorism (IJCWT) 2 (3), 12-25, 2012
362012
Long-term electricity sector expansion planning: A unique opportunity for a least cost energy transition in South Africa
JG Wright, T Bischof-Niemz, JR Calitz, C Mushwana, R Van Heerden
Renewable Energy Focus 30, 21-45, 2019
352019
Formal comments on the integrated resource plan (IRP) update assumptions, base case and observations 2016
JG Wright, JR Calitz, PR Van Heerden, ST Bischof-Niemz, C Mushwana, ...
322017
Automatic number plate segmentation and recognition
C Nieuwoudt, R Van Heerden
Seventh annual South African workshop on Pattern Recognition, 88-93, 1996
241996
Formal comments on the Integrated Resource Plan (IRP) update assumptions, base case and observations
J Wright, T Bischof-Niemz, J Calitz, C Mushwana, R Van Heerden, ...
Council for Scientific and Industrial Research, Pretoria, 2017
232017
Classification of cyber attacks in South Africa
R Van Heerden, S Von Soms, R Mooi
2016 IST-Africa Week Conference, 1-16, 2016
212016
Comparing Models of Offensive Cyber Operations
T Grant, I Burke, R van Heerden
Proceedings of the 7th International Warfare and Security, 108-121, 2012
212012
Major security incidents since 2014: An African perspective
R Van Heerden, S Von Solms, J Vorster
2018 IST-Africa Week Conference (IST-Africa), Page 1 of 11-Page 11 of 11, 2018
152018
Reference architecture for android applications to support the detection of manipulated evidence
H Pieterse, MS Olivier, RP Van Heerden
SAIEE Africa Research Journal 107 (2), 92-103, 2016
152016
Automated classification of computer network attacks
R van Heerden, L Leenen, B Irwin
2013 International Conference on Adaptive Science and Technology, 1-7, 2013
152013
The consequences of Edward Snowden NSA related information disclosures
S Von Solms, R Van Heerden
ICCWS 2015—The Proceedings of the 10th International Conference on Cyber …, 2015
132015
Optimization of vehicle license plate segmentation and symbol recognition
BEC van Heerden, R.P.
Twelfth Annual Symposium of the South African Pattern Recognition Association, 2001
13*2001
Smartphone data evaluation model: Identifying authentic smartphone data
H Pieterse, M Olivier, R Van Heerden
Digital Investigation 24, 11-24, 2018
122018
Playing hide-and-seek: Detecting the manipulation of Android Timestamps
H Pieterse, MS Olivier, RP van Heerden
Information Security for South Africa (ISSA), 2015
122015
Using an ontology for network attack planning
R van Heerden, P Chan, L Leenen, J Theron
International Journal of Cyber Warfare and Terrorism (IJCWT) 6 (3), 65-78, 2016
102016
Using Markov Models to crack passwords
RP Van Heerden, JS Vorster
The 3rd International Conference on Information Warfare and Security: Peter …, 2008
102008
Detecting manipulated smartphone data on Android and iOS Devices
H Pieterse, M Olivier, R Van Heerden
Information Security: 17th International Conference, ISSA 2018, Pretoria …, 2019
92019
Evaluating the authenticity of smartphone evidence
H Pieterse, M Olivier, R Van Heerden
Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International …, 2017
92017
系统目前无法执行此操作,请稍后再试。
文章 1–20