关注
Heloise Pieterse
Heloise Pieterse
其他姓名Heloise Meyer
SANReN, NICIS, CSIR
在 csir.co.za 的电子邮件经过验证
标题
引用次数
引用次数
年份
Android botnets on the rise: Trends and characteristics
H Pieterse, MS Olivier
2012 information security for South Africa, 1-5, 2012
1232012
Fake news and deepfakes: A dangerous threat for 21st century information security
J Botha, H Pieterse
ICCWS 2020 15th International Conference on Cyber Warfare and Security …, 2020
762020
Design of a hybrid command and control mobile botnet
H Pieterse, M Olivier
Journal of Information Warfare 12 (1), 70-82, 2013
292013
Bluetooth command and control channel
H Pieterse, MS Olivier
Computers & security 45, 75-83, 2014
232014
The cyber threat landscape in South Africa: A 10-year review
H Pieterse
The African Journal of Information and Communication 28, 1-21, 2021
182021
Data hiding techniques for database environments
H Pieterse, M Olivier
Advances in Digital Forensics VIII: 8th IFIP WG 11.9 International …, 2012
182012
Reference architecture for android applications to support the detection of manipulated evidence
H Pieterse, MS Olivier, RP Van Heerden
SAIEE Africa Research Journal 107 (2), 92-103, 2016
152016
Smartphone data evaluation model: Identifying authentic smartphone data
H Pieterse, M Olivier, R Van Heerden
Digital Investigation 24, 11-24, 2018
122018
Playing hide-and-seek: Detecting the manipulation of Android timestamps
H Pieterse, MS Olivier, RP Van Heerden
2015 Information Security for South Africa (ISSA), 1-8, 2015
122015
Smartphones as distributed witnesses for digital forensics
H Pieterse, M Olivier
Advances in Digital Forensics X: 10th IFIP WG 11.9 International Conference …, 2014
122014
Security steps for smartphone users
H Pieterse, MS Olivier
2013 Information Security for South Africa, 1-6, 2013
102013
Rising above misinformation and deepfakes
N Veerasamy, H Pieterse
International Conference on Cyber Warfare and Security 17 (1), 340-348, 2022
92022
Detecting manipulated smartphone data on Android and iOS Devices
H Pieterse, M Olivier, R Van Heerden
Information Security: 17th International Conference, ISSA 2018, Pretoria …, 2019
92019
Evaluating the authenticity of smartphone evidence
H Pieterse, M Olivier, R Van Heerden
Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International …, 2017
92017
Evaluation framework for detecting manipulated smartphone data
H Pieterse, M Olivier, R van Heerden
SAIEE Africa Research Journal 110 (2), 67-76, 2019
82019
Mapping the most significant computer hacking events to a temporal computer attack model
R Van Heerden, H Pieterse, B Irwin
ICT Critical Infrastructures and Society: 10th IFIP TC 9 International …, 2012
82012
Developing a virtualised testbed environment in preparation for testing of network based attacks
R van Heerden, H Pieterse, I Burke, B Irwin
2013 International Conference on Adaptive Science and Technology, 1-8, 2013
62013
Evaluation and Identification of Authentic Smartphone Data
H Pieterse
University of Pretoria, 2019
42019
Evolution study of android botnets
H Pieterse, I Burke
Iccws 2015—The proceedings of the 10th international conference on cyber …, 2015
42015
Mobile Forensics: Beyond Traditional Sources of Digital Evidence
H Pieterse
19th European Conference on Cyber Warfare and Security, 295-303, 2020
32020
系统目前无法执行此操作,请稍后再试。
文章 1–20