Major security incidents since 2014: An African perspective R Van Heerden, S Von Solms, J Vorster 2018 IST-Africa Week Conference (IST-Africa), Page 1 of 11-Page 11 of 11, 2018 | 15 | 2018 |
A constraint-based solver for the military unit path finding problem L Leenen, JS Vorster, H le Roux Proceedings of the 2010 Spring Simulation Multiconference, 25, 2010 | 11 | 2010 |
Using Markov Models to crack passwords RP van Heerden, JS Vorster The 3rd International Conference on Information Warfare and Security: Peter …, 2008 | 10 | 2008 |
Statistical analysis of large passwords lists, used to optimize brute force attacks RP Van Heerden, JS Vorster Proceedings of the 4th International Conference On Information Warfare and …, 2009 | 8 | 2009 |
A Framework for the Implementation of Graphical Passwords JS Vorster M.Sc., University of Liverpool, 2014 | 6 | 2014 |
The Pattern-richness of Graphical Passwords JS Vorster, RP van Heerden, B Irwin Proceedings of the 15th International Information Security South Africa …, 2016 | 5 | 2016 |
Graphical Passwords: A Qualitative Study of Password Patterns JS Vorster, RP van Heerden The Proceedings of the 10th International Conference on Cyber Warfare and …, 2015 | 5 | 2015 |
Heuristic Attacks against graphical password generators S Peach, JS Vorster, RP Van Heerden Proceedings of the South African Information Security Multi-Conference …, 2010 | 5 | 2010 |
A Study of Perceptions of Graphical Passwords JS Vorster, RP Van Heerden The Journal of Information Warfare 14 (3), 2015 | 3 | 2015 |
Network mapping and usage determination FP Senekal, JS Vorster Military Information Communications Simposium South Africa 2007, Pretoria …, 2007 | 3 | 2007 |
Consensus Simulator for Organisational Structures JS Vorster, L Leenen Proceedings of the 13th International Conference on Simulation and Modeling …, 2023 | 2 | 2023 |
Exploring the Effects of Subversive Agents on Consensus-seeking Processes using a Multi-agent Simulator JS Vorster, L Leenen Proceedings of the 13th International Conference on Simulation and Modeling …, 2023 | 1 | 2023 |
Violations of good security practices in graphical passwords schemes: Enterprise constraints on scheme-design JS Vorster, B Irwin, RP Van Heerden Proceedings of the 13th International Conference on Cyber Warfare and …, 2018 | 1 | 2018 |
Implementing Honeypots as Part of a Simple Cost Effective Wireless Intrusion Detection System HM Velupillai, RP van Heerden, JS Vorster Southern African Telecommunications Networks and Applications Conference …, 2007 | 1 | 2007 |
Applying data-mining techniques in honeypot analysis N Veerasamy, PM Mokhonoana, JS Vorster Information Security South Africa Conference (ISSA2006),1-5 July 2006, 2006 | 1 | 2006 |
Covert Subversive Agents and Consensus Disruption on Large Projects J Vorster, L Leenen International Conference on Cyber Warfare and Security 19 (1), 421-429, 2024 | | 2024 |
Developing an Evaluation Framework for Authentication Schemes: Using Grounded Theory applied to Standards to develop a framework for authentication scheme evaluation, with … JS Vorster PhD, Rhodes University, 2023 | | 2023 |
Information Warfare: An Information Manamgement Perspective JS Vorster, R Van Heerden IFIP TC9 Proceedings on ICT uses in Warfare and the Safeguarding of Peace, 76-83, 2008 | | 2008 |
Statistical Analysis of Popular Passwords R van Heerden, JS Vorster IFIP TC9 Proceedings on ICT uses in Warfare and the Safeguarding of Peace …, 2008 | | 2008 |
An innovative numerical algorithm for the calculation of intermittent building thermal loads PG Rousseau, JS Vorster, EH Mathews 9th International Conference on Numerical Methods in Thermal Problems 9 (2 …, 1995 | | 1995 |