System inertia and Rate of Change of Frequency (RoCoF) with increasing non-synchronous renewable energy penetration GA Chown, JG Wright, RP Van Heerden, M Coker | 48 | 2017 |
Classifying network attack scenarios using an ontology RP Van Heerden, B Irwin, I Burke Proceedings of the 7th International Conference on Information-Warfare …, 2012 | 41 | 2012 |
A computer network attack taxonomy and ontology RP Van Heerden, B Irwin, ID Burke, L Leenen International Journal of Cyber Warfare and Terrorism (IJCWT) 2 (3), 12-25, 2012 | 36 | 2012 |
Long-term electricity sector expansion planning: A unique opportunity for a least cost energy transition in South Africa JG Wright, T Bischof-Niemz, JR Calitz, C Mushwana, R Van Heerden Renewable Energy Focus 30, 21-45, 2019 | 35 | 2019 |
Formal comments on the integrated resource plan (IRP) update assumptions, base case and observations 2016 JG Wright, JR Calitz, PR Van Heerden, ST Bischof-Niemz, C Mushwana, ... | 32 | 2017 |
Automatic number plate segmentation and recognition C Nieuwoudt, R Van Heerden Seventh annual South African workshop on Pattern Recognition, 88-93, 1996 | 24 | 1996 |
Formal comments on the Integrated Resource Plan (IRP) update assumptions, base case and observations J Wright, T Bischof-Niemz, J Calitz, C Mushwana, R Van Heerden, ... Council for Scientific and Industrial Research, Pretoria, 2017 | 23 | 2017 |
Classification of cyber attacks in South Africa R Van Heerden, S Von Soms, R Mooi 2016 IST-Africa Week Conference, 1-16, 2016 | 21 | 2016 |
Comparing Models of Offensive Cyber Operations T Grant, I Burke, R van Heerden Proceedings of the 7th International Warfare and Security, 108-121, 2012 | 21 | 2012 |
Major security incidents since 2014: An African perspective R Van Heerden, S Von Solms, J Vorster 2018 IST-Africa Week Conference (IST-Africa), Page 1 of 11-Page 11 of 11, 2018 | 15 | 2018 |
Reference architecture for android applications to support the detection of manipulated evidence H Pieterse, MS Olivier, RP Van Heerden SAIEE Africa Research Journal 107 (2), 92-103, 2016 | 15 | 2016 |
Automated classification of computer network attacks R van Heerden, L Leenen, B Irwin 2013 International Conference on Adaptive Science and Technology, 1-7, 2013 | 15 | 2013 |
The consequences of Edward Snowden NSA related information disclosures S Von Solms, R Van Heerden ICCWS 2015—The Proceedings of the 10th International Conference on Cyber …, 2015 | 13 | 2015 |
Optimization of vehicle license plate segmentation and symbol recognition BEC van Heerden, R.P. Twelfth Annual Symposium of the South African Pattern Recognition Association, 2001 | 13* | 2001 |
Smartphone data evaluation model: Identifying authentic smartphone data H Pieterse, M Olivier, R Van Heerden Digital Investigation 24, 11-24, 2018 | 12 | 2018 |
Playing hide-and-seek: Detecting the manipulation of Android Timestamps H Pieterse, MS Olivier, RP van Heerden Information Security for South Africa (ISSA), 2015 | 12 | 2015 |
Using an ontology for network attack planning R van Heerden, P Chan, L Leenen, J Theron International Journal of Cyber Warfare and Terrorism (IJCWT) 6 (3), 65-78, 2016 | 10 | 2016 |
Using Markov Models to crack passwords RP Van Heerden, JS Vorster The 3rd International Conference on Information Warfare and Security: Peter …, 2008 | 10 | 2008 |
Detecting manipulated smartphone data on Android and iOS Devices H Pieterse, M Olivier, R Van Heerden Information Security: 17th International Conference, ISSA 2018, Pretoria …, 2019 | 9 | 2019 |
Evaluating the authenticity of smartphone evidence H Pieterse, M Olivier, R Van Heerden Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International …, 2017 | 9 | 2017 |