Social engineering attack examples, templates and scenarios F Mouton, L Leenen, HS Venter Computers & Security 59, 186-209, 2016 | 293 | 2016 |
Bacterial co-infections and antibiotic resistance in patients with COVID-19 H Mahmoudi GMS hygiene and infection control 15, 2020 | 192 | 2020 |
A taxonomy for information security technologies HS Venter, JHP Eloff Computers & Security 22 (4), 299-307, 2003 | 182 | 2003 |
Social engineering attack framework F Mouton, MM Malan, L Leenen, HS Venter 2014 Information Security for South Africa, 1-9, 2014 | 161 | 2014 |
Taxonomy of challenges for digital forensics NM Karie, HS Venter Journal of forensic sciences 60 (4), 885-893, 2015 | 132 | 2015 |
Towards an ontological model defining the social engineering domain F Mouton, L Leenen, MM Malan, HS Venter ICT and Society: 11th IFIP TC 9 International Conference on Human Choice and …, 2014 | 127 | 2014 |
Social engineering attack detection model: Seadm M Bezuidenhout, F Mouton, HS Venter 2010 Information Security for South Africa, 1-8, 2010 | 109 | 2010 |
An approach to implement a network intrusion detection system using genetic algorithms MM Pillai, JHP Eloff, HS Venter ACM International Conference Proceeding Series 75, 221-221, 2004 | 107 | 2004 |
Harmonised digital forensic investigation process model A Valjarevic, HS Venter 2012 Information Security for South Africa, 1-10, 2012 | 100 | 2012 |
Diverging deep learning cognitive computing techniques into cyber forensics NM Karie, VR Kebande, HS Venter Forensic Science International: Synergy 1, 61-67, 2019 | 93 | 2019 |
Necessity for ethics in social engineering research F Mouton, MM Malan, KK Kimppa, HS Venter Computers & Security 55, 114-127, 2015 | 93 | 2015 |
Novel digital forensic readiness technique in the cloud environment VR Kebande, HS Venter Australian Journal of Forensic Sciences 50 (5), 552-591, 2018 | 77 | 2018 |
A cloud forensic readiness model using a botnet as a service VR Kebande, HS Venter The international conference on digital security and forensics …, 2014 | 74 | 2014 |
Digital forensic readiness in the cloud PM Trenwith, HS Venter 2013 Information Security for South Africa, 1-5, 2013 | 71 | 2013 |
Exploring forensic data with self-organizing maps B Fei, J Eloff, H Venter, M Olivier Advances in Digital Forensics: IFIP International Conference on Digital …, 2005 | 71 | 2005 |
The use of self-organising maps for anomalous behaviour detection in a digital investigation BKL Fei, JHP Eloff, MS Olivier, HS Venter Forensic Science International 162 (1-3), 33-37, 2006 | 65 | 2006 |
A comprehensive and harmonized digital forensic investigation process model A Valjarevic, HS Venter Journal of forensic sciences 60 (6), 1467-1483, 2015 | 64 | 2015 |
On digital forensic readiness in the cloud using a distributed agent-based solution: issues and challenges VR Kebande, HS Venter Australian Journal of Forensic Sciences 50 (2), 209-238, 2018 | 62 | 2018 |
The architecture of a digital forensic readiness management system K Reddy, HS Venter Computers & security 32, 73-89, 2013 | 61 | 2013 |
Using time-driven activity-based costing to manage digital forensic readiness in large organisations K Reddy, HS Venter, MS Olivier Information Systems Frontiers 14, 1061-1077, 2012 | 61 | 2012 |