Name
Papers
Collaborators
HEIN S. VENTER
65
58
Citations 
PageRank 
Referers 
273
49.79
526
Referees 
References 
593
307
Search Limit
100593
Title
Citations
PageRank
Year
Cbac4c: Conflict-Based Vm Isolation Control For Cloud Computing00.342022
Proactive Forensics: Keystroke Logging from the Cloud as Potential Digital Evidence for Forensic Readiness Purposes00.342020
Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings00.342020
Information Security - 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers00.342019
Digital behavioral-fingerprint for user attribution in digital forensics: Are we there yet?00.342019
Implementing The Harmonized Model For Digital Evidence Admissibility Assessment00.342019
Polychronicity tendency-based online behavioral signature00.342019
A Conceptual Model for Consent Management in South African e-Health Systems for Privacy Preservation.00.342019
The Current State of Electronic Consent Systems in e-Health for Privacy Preservation.00.342018
Towards an Integrated Digital Forensic Investigation Framework for an IoT-Based Ecosystem00.342018
Performance Costs of Software Cryptography in Securing New-Generation Internet of Energy Endpoint Devices.40.442018
A Digital Forensic Readiness Architecture for Online Examinations00.342018
Digital Forensic Readiness Framework for Ransomware Investigation10.372018
A Model for Digital Evidence Admissibility Assessment.00.342017
High-level online user attribution model based on human Polychronic-Monochronic tendency10.362017
A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness00.342017
Understanding the Level of Compliance by South African Institutions to the Protection of Personal Information (POPI) Act.00.342016
Social engineering attack examples, templates and scenarios.80.682016
Proof of Concept of the Online Neighbourhood Watch System.00.342015
Locating and Tracking Digital Objects in the Cloud.00.342015
Necessity for ethics in social engineering research30.442015
Social Engineering Attack Detection Model: SEADMv2.10.372015
Introduction00.342014
Towards a Model for acquiring Digital Evidence using Mobile Devices.10.482014
The architecture of a digital forensic readiness management system90.532013
An Ontological Framework for a Cloud Forensic Environment.00.342013
Digital forensic readiness in a cloud environment30.402013
A Harmonized Process Model for Digital Forensic Investigation Readiness.00.342013
Selection and ranking of remote hosts for digital forensic investigation in a Cloud environment.00.342013
System-Generated Digital Forensic Evidence in Graphic Design Applications.00.342013
Implementation guidelines for a harmonised digital forensic investigation readiness process model.10.362013
Implementing Forensic Readiness Using Performance Monitoring Tools.10.372012
Development of Cognitive Functioning Psychological Measures for the SEADM.40.672012
Finding Digital Forensic Evidence in Graphic Design Applications.00.342012
The Modelling of a Digital Forensic Readiness Approach for Wireless Local Area Networks.10.352012
Towards Solving the Identity Challenge faced by Digital Forensics.00.342012
Guidelines For Procedures Of A Harmonised Digital Forensic Process In Network Forensics40.512012
Combating Mobile Spam through Botnet Detection using Artificial Immune Systems.30.372012
Harmonised Digital Forensic Investigation Process Model70.672012
Detecting Mobile Spam Botnets Using Artificial immune Systems.60.632011
Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities.00.342011
Adding digital forensic readiness to electronic communication using a security monitoring tool.00.342011
Requirements for wireless sensor networks in order to achieve digital forensic readiness.10.382011
A Budget Model for Information Security.00.342011
State of the Art of Digital Forensic Techniques.00.342011
A prototype for achieving digital forensic readiness on wireless sensor networks50.492011
A Forensic Readiness Model for Wireless Networks40.412010
Adding digital forensic readiness to the email trace header.10.372010
Mobile botnet detection using network forensics140.762010
The Design of a Wireless Forensic Readiness Model(WFRM).00.342009
  • 1
  • 2