|
Research:
Publications
Publications from all my research interests
Publications are listed in reverse
chronological order according to publication date. The publications listed on
this page include all my publications from all listed areas of interests.
2012
-
VAN STADEN, R. F.;
VENTER, H.S.; 2011; “Using Performance Monitoring Software to Implement
Digital Forensics Readiness”; 8th Annual IFIP WG 11.9
International Conference on Digital Forensics; Pretoria, Gauteng, South
Africa.
2011
-
OLIVIER, M.S.; ELOFF, J.H.P.;
VENTER, H.S.; 2011; BOTES, M.E.; "Using e-coins to ensure fair
sharing of donor funds amongst HIV healthcare facilities"; South African
Computer Journal; No. 47; pp.47-57; South African Institute of Computer
Scientists and Information Technologists; ISSN 1015-7999.
-
REDDY, K.; VENTER, H.S.;
OLIVIER, M.S.; 2011; “Using Time-Driven Activity-Based Costing to Manage
Digital Forensic Readiness for Information Privacy Incidents”;
Information
Systems Frontiers;
Springer; ISSN 1387-3326.
-
VURAL, I.; VENTER, H.S.;
2011; “A Network Forensic Implementation for Detecting Mobile Botnets using
Artificial Immune Systems”; 7th Annual IFIP WG 11.9
International Conference on Digital Forensics; Orlando, Florida, USA.
-
GROBLER, M.; FLOWERDAY, S.;
VON SOLMS, R.; VENTER H.S.; "Cyber Awareness Initiatives in South
Africa: A National Perspective"; First IFIP TC9/TC11 Southern African Cyber
Security Awareness Workshop (SACSAW11); Gaberone, Botswana; ISBN:
978-0-620-50050-0; pp 32-41.
-
DLAMINI, M.; ELOFF, J.H.P.;
ELOFF, M.M.; VENTER, H.S.; 2011; “A Cost Effective and Optimal
Information Security Budget”; Fifth International Symposium on Human
Aspects of Information Security & Assurance (HAISA); London, UK.
-
MOUTON, F.; VENTER, H.S.;
2011; “Requirements for wireless sensor networks in order to achieve digital
forensic readiness”; 6th International Annual Workshop on Digital
Forensics & Incident Analysis (WDFIA); London, UK.
-
MOUTON, F.; VENTER, H.S.;
2011; “Achieving digital forensic readiness on wireless sensor networks”;
IEEE Africon 2011; Livingstone, Zambia.
-
VAN STADEN, R.F.; VENTER,
H.S.; 2011; “Adding digital forensic readiness to electronic
communication using a security monitoring tool”; 2011 Information
Security for South Africa (ISSA): Proceedings of the ISSA2011 Conference;
Johannesburg, South Africa;
ISBN 978-1-4577-1483-2.
-
VALJAREVIC, A.; VENTER,
H.S.; 2011; “Towards a Digital Forensic Readiness Framework for Public
Key Infrastructure Systems”; 2011 Information Security for South Africa (ISSA):
Proceedings of the ISSA2011 Conference; Johannesburg, South Africa; ISBN
978-1-4577-1483-2.
-
SERRA, S.; VENTER, H.S.;
2011; “Mobile cyber-bullying and the children of South Africa: A proposal
for a pre-emptive approach to risk mitigation by employing digital forensic
readiness”; 2011 Information Security for South Africa (ISSA):
Proceedings of the ISSA2011 Conference; Johannesburg, South Africa; ISBN
978-1-4577-1483-2.
-
DLAMINI, M.; VENTER, H.S.;
ELOFF, J.H.P.; ELOFF, M.M.; 2011; " Security of Cloud Computing: Seeing
Through the Fog";
SATNAC: South African Telecommunication Networks &
Applications Conference;
East London Convention Centre, East London, South Africa.
2010
-
ROSSODOWSKI, A.M.;
VENTER, H.S.; ELOFF, J.H.P.; KOURIE, D.G; 2010; “A Security Privacy
Aware Architecture and Protocol for a Single Smart Card used for Multiple
Services”; Computers & Security; Vol. 29; pp. 393-409; Elsevier; ISSN
0167-4048.
-
NGOBENI, S.; VENTER, H.S.;
2010; “The modelling of a forensic readiness approach to wireless LAN
Forensics”; 6th Annual IFIP WG 11.9 International Conference
on Digital Forensics; Hong Kong, China.
-
VURAL, I.; VENTER, H.S.;
2010; “Using network forensics and artificial intelligence techniques to
detect Bot-nets on an organizational network”; 7th International
Conference on Information Technology: New Generations; Las Vegas,
Nevada, USA; IEEE Computer Society; ISBN: 978-0-7695-3984-3.
-
VURAL, I.; VENTER, H.S.;
2010; “Mobile Botnet Detection using Network Forensics”; 3rd Future
Internet Symposium 2010; Berlin, Germany; Springer; Lecture Notes in
Computer Science, Vol. 6369/2010, 57-67, DOI: 10.1007/978-3-642-15877-3_7.
-
REDDY, K.; VENTER, H.S.;
2010; "Information Privacy in Two Dimensions - Towards a Classification
Scheme for Information Privacy Research"; 2010 IEEE Second International
Conference on Social Computing; Minneapolis, Minnesota, USA.
-
VAN STADEN, R.F.; VENTER,
H.S.; 2010; “Adding digital forensic readiness to the email trace
header”; 2010 Information Security for South Africa: Proceedings of the
ISSA 2010 Conference; Sandton, South Africa; ISBN 978-1-4244-5495-2.
-
MOUTON, F.; VENTER, H.S.;
2010; “Social Engineering Attack Detection Model:
SEADM”; 2010 Information
Security for South Africa: Proceedings of the ISSA 2010 Conference;
Sandton, South Africa; ISBN 978-1-4244-5495-2.
2009
-
REDDY, K.; VENTER, H.S.;
2009; “Towards A Forensic Readiness Framework For Information Privacy
Incidents”; 5th Annual IFIP WG 11.9 International Conference
on Digital Forensics; Orlando, Florida, USA.
-
MOUTON, F.; VENTER, H.S.;
2009; “A Secure Communication Protocol for Wireless Sensor Networks”; 8th
Annual Security Conference; Las Vegas, Nevada, USA.
-
REDDY, K.; VENTER, H.S.;
2009; “Using Object-Oriented Concepts to Develop a High-Level Information
Privacy Risk Management Model”; The Third International Conference on
Emerging Security Information, Systems and Technologies (SECURWARE 2009);
Athens, Greece.
-
NGOBENI, S.; VENTER, H.S.;
2009; “The Design of a Wireless Forensic Readiness Model (WFRM)”;
Information Security South Africa: Proceedings of the 2009 ISSA Conference;
Johannesburg, South Africa; pp. 455-466; ISBN 978-1-86854-740-1.
-
VURAL, I.; VENTER, H.S.;
2009; “Investigating Identity Concealing and Email Tracing Techniques”;
Information Security South Africa: Proceedings of the 2009 ISSA Conference;
Johannesburg, South Africa; pp. 293-308; ISBN 978-1-86854-740-1.
2008
-
VENTER, H.S.;
ELOFF, J.H.P.; LI. Y.L.; 2008; “Standardising vulnerability categories”;
Computers & Security; Vol. 27; pp. 71-83; Elsevier Limited; ISSN:
0167-4048.
-
ARTHUR, K.K.; OLIVIER, M.S.;
VENTER, H.S.; ELOFF, J.H.P.; 2008; “Considerations Towards a Cyber
Crime Profiling System”; Proceedings of AReS 2008 - The Third
International Conference on Availability, Security and Reliability; pp.
1388-1393, IEEE.
-
REDDY, K.; VENTER, H.S.,
M.S. OLIVIER, I. CURRIE; 2008; “Towards Privacy Taxonomy-Based Attack Tree
Analysis for the Protection of
Consumer Information Privacy”; Sixth Annual Conference on
Privacy, Security and Trust; Fredericton, New Brunswick, Canada.
-
VENTER, H.S.;
ELOFF, J.H.P.; WOJCIK, M.; 2008; “Implementing Prejudice in Trust Models: A
Prototype”;The 13th Nordic Workshop on Secure IT Systems; Copenhagen,
Denmark.
2007
-
ARTHUR, K.K.; OLIVIER, M.S.;
VENTER, H.S.; 2007; “Applying the Biba Integrity Model within a
Forensic Evidence Management System”; Third Annual IFIP WG 11.9
International Conference on Digital Forensics; Orlando, Florida, USA.
-
ROSSUDOWSKI, A.M.;
VENTER, H.S.; ELOFF, J.H.P.; 2007; “Personal Anomaly-based Intrusion
Detection Smart Card Using Behavioural Analysis”; 22nd IFIPSEC
Conference on New Approaches for Security, Privacy and Trust in
Complex Environments; Sandton, South Africa.
-
ROSSUDOWSKI, A.M.;
VENTER, H.S.; 2007; “Secure Remote User Authentication over an Unsecure
Telecommunications Network”; 10th SATNAC: South African
Telecommunication Networks & Applications Conference; Sugar Beach,
Mauritius.
-
REDDY, K.; VENTER, H.S.;
2007; “Privacy Capability Maturity Models within Telecommunications
Organisations”; 10th SATNAC: South African
Telecommunication Networks & Applications Conference; Sugar Beach,
Mauritius.
-
GRANT, T.; VENTER, H.S.;
ELOFF, J.H.P.; 2007; “Simulating adversarial interactions between intruders
and system administrators using OODA-RR”; SAICSIT: Annual Conference of
the South African Institute of Computer Scientists & Information
Technologists, Protea Hotel, Stellenbosch, South Africa; Fish River Sun,
South Africa.
2006
-
FEI, B.K.L.;
ELOFF, J.H.P.; OLIVIER, M.S.; VENTER, H.S.;
2006; "The use of self-organising maps for anomalous behaviour detection in
a digital investigation"; Forensic Science International; In press.
-
WOJCIK, M.; ELOFF, J.H.P;
VENTER, H.S.; 2006; "Trust Model Architecture: Defining Prejudice by
Learning"; Lecture notes in Computer Science; The Third
International Conference on Trust, Privacy & Security in Digital Business (TrustBus);
pp 182-191; Springer; ISBN 3540377506.
-
WOJCIK, M.;
VENTER, H.S.; ELOFF, J.H.P.; 2006 "Trust
Model Evaluation Criteria: A Detailed Analysis of Trust Representation ";
SATNAC: South
African Telecommunication Networks & Applications Conference; Spier
Conference Centre, Stellenbosch, South Africa.
-
WOJCIK, M.;
VENTER, H.S.; ELOFF, J.H.P.; 2006 "Trust
Model Evaluation Criteria: A Detailed Analysis of Trust Evaluation";
ISSA: Information
Security South Africa Proceedings; Sandton, South Africa.
-
FEI, B.L.K.;
ELOFF, J.H.P.; OLIVIER, M.S.; VENTER, H.S.; 2006; “Network Forensics: Web
Proxy Log Analysis”; Fifth Annual Digital Forensics Conference;
Orlando, Florida, USA.
-
WOJCIK, M.;
VENTER, H.S.; ELOFF, J.H.P.; 2006; “Trust-based Forensics”; Fifth Annual
Digital Forensics Conference; Orlando, Florida, USA.
2005
-
VENTER, H.S.;
ELOFF, J.H.P; M.M. ELOFF; L. LABUSCHAGNE; 2004; Peer-reviewed proceedings
of the ISSA 2005 New Knowledge Today Conference; ISBN 1-86854-625-X.
-
LAUBSCHER,
R; RABE, D.; OLIVIER, M.S.; ELOFF, J.H.P.; VENTER, H.S.; 2005;
First Annual IFIP WG 11.9 International Conference on Digital Forensics;
“Applying Computer Forensic Principles in Evidence Collection and Analysis
for a Computer-Based Programming Assessment”; Orlando, Florida, USA.
-
FEI, B.;
ELOFF, J.H.P; VENTER, H.S.; OLIVIER, M.S.; 2005; First Annual IFIP
WG 11.9 International Conference on Digital Forensics; “Exploring Data
Generated by Computer Forensic Tools with Self-Organizing Maps”; Orlando,
Florida, USA.
-
TILLWICK,
H.; NEUMANN, T.; OLIVIER, M.S.; VENTER, H.S.; ELOFF, J.H.P.; 2005;
Fifth International Network Conference (INC2005); “Polar: Proxies
Collaborating to Achieve Anonymous Web Browsing”; Doryssa Bay, Samos,
Greece.
-
VENTER, H.S.;
OLIVIER, M.S.; ELOFF, J.H.P.; BOTES, M.E.; 2005; Fifth International
Network Conference (INC2005); “Balancing Patient Privacy and Treatment
Facility Accountability using a Centralised Pseudonymous HIV/AIDS Database”;
Doryssa Bay, Samos, Greece.
-
MORKEL, T.;
OLIVIER, M.S.; ELOFF, J.H.P.; VENTER, H.S.; 2005; "One-time Passwords
in a Mobile Environment using Steganography"; Workshop on Security,
Privacy and Trust in Pervasive and Ubiquitous Computing (IEEE SecPerU 2005);
Santorini, Greece.
-
CROFT,
N.J.; OLIVIER, M.S.; VENTER, H.S.; 2005; "Codec-Hopping: Secure and
Private Voice Communication in Bandwidth Constrained Networks"; Workshop
on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (IEEE
SecPerU 2005); Santorini, Greece.
-
KELETA, Y.;
COETZEE, M.; ELOFF, J.H.P, VENTER, H.S.; 2005 “Proposing a Secure
XACML architecture ensuring privacy and trust”; ISSA: Information
Security South Africa Proceedings; Sandton, South Africa.
-
FEI, B.K.L;
TILLWICK, H.; ELOFF, J.H.P.; VENTER, H.S.; OLIVIER, M.S.; 2005;
“Using Self-Organising Maps for Anomalous Behaviour Detection in a Computer
Forensic Investigation”; ISSA: Information Security South Africa
Proceedings; Sandton, South Africa.
-
LAUBSCHER,
R.; RABE, D.J.; OLIVIER, M.S.; ELOFF, J.H.P; VENTER, H.S.; 2005;
“Computer forensics for a computer-based assessment: the preparation phase”;
ISSA: Information Security South Africa Proceedings; Sandton, South
Africa.
-
LAUBSCHER,
R.; RABE, D.J.; OLIVIER, M.S.; ELOFF, J.H.P; VENTER, H.S.; 2005;
“Computer Forensics for Computer-Based Assessment: The Preparation Phase”;
SAICSIT: Annual Conference of the South African Institute of Computer
Scientists & Information Technologists; White River; South Africa.
-
WOJCIK, M.;
VENTER, H.S.; ELOFF, J.H.P.; OLIVIER, M.S.; 2005; “Incorporating
Prejudice into Trust Models to Reduce Network Overload”; SATNAC: South
African Telecommunication Networks & Applications Conference; Champagne
Sports Resort, Drakensberg, South Africa.
-
OYOMNO, W.;
VENTER, H.S.; 2005; “Link Layer Type-Tagging in Fixed-Phrase Speaker
Verification Systems”; SATNAC: South African Telecommunication Networks &
Applications Conference; Champagne Sports Resort, Drakensberg, South
Africa.
-
TSHIVHASE,
F.E.; VENTER, H.S.; ELOFF, J.H.P; 2005; “Implementing Application and
Network Security using Aspect-oriented Programming”; SATNAC: South
African Telecommunication Networks & Applications Conference; Champagne
Sports Resort, Drakensberg, South Africa.
-
ROSSUDOWSKI,
A.M.; VENTER, H.S.; 2005; “The use of smart cards to perform ATM
transactions in an off-line environment”; SATNAC: South African
Telecommunication Networks & Applications Conference; Champagne Sports
Resort, Drakensberg, South Africa.
2004
-
VENTER, H.S.;
ELOFF, J.H.P; M.M. ELOFF; L. LABUSCHAGNE; 2004; Peer-reviewed proceedings
of the ISSA 2004 enabling tomorrow Conference; ISBN 1-86854-522-9.
-
VENTER, H.S.;
ELOFF, J.H.P.; 2004; Computers & Security; “Vulnerability Forecasting
– A Conceptual Model”; Vol. 23, No. 6; pp. 489-497; Elsevier Science; ISSN
0167-4048.
-
VENTER, H.S.;
OLIVIER, M.S.; ELOFF, J.H.P.; 2004; Internet Research: Electronic
Networking Applications and Policy; “PIDS: A Privacy Intrusion Detection
System”; Vol. 14, No. 5; pp. 360-365; Emerald Group Publishing Limited;
ISSN: 1066-2243.
-
VENTER, H.S.;
OLIVIER, M. S.; ELOFF, J.H.P.; 2004; International Network Conference;
“PIDS: A Privacy Intrusion Detection System”; Plymouth, United Kingdom.
-
LI, Y.;
VENTER, H.S.; ELOFF, J.H.P.; 2004; Peer-reviewed Proceedings of the
ISSA 2004 enabling tomorrow Conference, Gallagher Estate, Johannesburg,
South Africa; “Categorizing vulnerabilities using data clustering
techniques”.
-
ARTHUR, K.
K.; VENTER, H.S.; 2004; Peer-reviewed Proceedings of the ISSA 2004
enabling tomorrow Conference, Gallagher Estate, Johannesburg, South Africa;
“An Investigation into Computer Forensic Tools”.
-
PILLAI, M.
M.; VENTER, H.S.; ELOFF, J.H.P.; 2004; SAICSIT: Annual Conference
of the South African Institute of Computer Scientists & Information
Technologists, Protea Hotel, Stellenbosch, South Africa; “An Approach to
Implement a Network Intrusion Detection System using Genetic Algorithms”.
-
KELETA, Y. G.;
VENTER, H.S.;
ELOFF, J.H.P.; 2004; SAICSIT: Annual Conference of the South African
Institute of Computer Scientists & Information Technologists, Protea Hotel,
Stellenbosch, South Africa; “Web services security
policy
integration”.
-
FEI, B. K.
L.; VENTER, H.S.; ELOFF, J.H.P.; 2004; SAICSIT: Annual Conference
of the South African Institute of Computer Scientists & Information
Technologists, Protea Hotel, Stellenbosch, South Africa; “Classifying
Computer Forensic Tools with the aim of Extending the Functionality of
EnCase”.
2003
-
VENTER, H.S.;
ELOFF, J.H.P; M.M. ELOFF; L. LABUSCHAGNE; 2003; Information Security
South Africa; ISBN 1-86854-485-0.
-
VENTER, H.S.;
ELOFF, J.H.P.; 2003; Computers & Security; “A Taxonomy for
Information Security Technologies”; Vol. 22, No. 4; pp. 299-307; Elsevier
Science; ISSN 0167-4048.
-
VENTER, H.S.;
ELOFF, J.H.P.; 2003; South African Computer Journal; “Evaluating
Vulnerability Scanners Using Harmonised Vulnerability Categories”; pp.
40-45; No. 31; Computer Society of South Africa South Africa; ISSN
1015-7999.
-
VENTER, H.S.;
ELOFF, J.H.P.; 2003; ICICT: International Conference on Information &
Communication Technology, Cairo, Egypt; “State of the Art Vulnerability
Detection and Suggestions for Improvement”.
-
VENTER, H.S.;
ELOFF, J.H.P.; 2003; ISSA: Information Security South Africa Proceedings,
Sandton Convention Centre, Johannesburg, South Africa; “Vulnerability
Detection”.
-
VENTER, H.S.;
ELOFF, J.H.P.; 2003; SAICSIT: Annual Conference of the South African
Institute of Computer Scientists & Information Technologists, Indaba Hotel,
Johannesburg, South Africa; “State of the Art Intrusion Detection and
Vulnerability Scanning”.
-
VENTER, H.S.;
ELOFF, J.H.P.; 2003; Network Security; “Assessment of Vulnerability
Scanners”; Vol. 2003 pp. 11-16; Elsevier Science;
ISSN 1353-4858.
2002
-
VENTER, H.S.;
ELOFF, J.H.P.; 2002; South African Computer Journal; “Harmonising
Vulnerability Categories”; pp. 24-31; No. 29; Computer Society of South
Africa South Africa; ISSN 1015-7999.
-
VENTER, H.S.;
ELOFF, J.H.P.; 2002; Computers & Security; “Vulnerabilities
Categories for Intrusion Detection Systems”; Vol. 21 no. 7, pp. 617-619;
Elsevier Science; ISSN 0167-4048.
-
VENTER, H.S.;
ELOFF, J.H.P.; 2002; ISSA: Information Security South Africa Proceedings,
Misty Hills Conference Centre, Johannesburg, South Africa; “Generic
Vulnerability Categories”.
-
VENTER, H.S.;
ELOFF, J.H.P.; 2002; SAICSIT: Annual Conference of the South African
Institute of Computer Scientists & Information Technologists, The Boardwalk
Conference Centre, Port Elizabeth, South Africa; “Enabling Businesses to
Evaluate Intrusion Detection Tools”.
2001
-
VENTER, H.S.;
ELOFF, J.H.P.; 2001; ISSA: Information Security South Africa,
Magaliesberg Conference Centre, Johannesburg, South Africa; “Dynamic
Intrusion Detection Systems”.
2000
-
VENTER, H.S.;
ELOFF, J.H.P.; 2000; IFIP/SEC: Information Security for Global
Information Infrastructures; “Network Security Health Checking”; ISBN
7-80003-466-6; pp. 287-220.
-
VENTER, H.S.;
ELOFF, J.H.P.; 2000; Network Security; “Network Security: Important
Issues”; Vol. 6 pp. 12-16; Elsevier Science;
ISSN 1353-4858.
-
VENTER, H.S.;
ELOFF, J.H.P.; 2000; IT Indaba, RAU, South Africa;
“A Model for Network Reconfiguration”.
1999
-
VENTER, H.S.;
ELOFF, J.H.P.; 1999;
Small Systems
Information Security Management & Small Systems Security;
“Real-time Risk Analysis on the Internet: A Prototype”; Kluwer Academic
Publishers; ISBN 0-7923-8626-4; pp. 11-27.
-
VENTER, H.S.;
ELOFF, J.H.P.; 1999; IT Indaba, RAU, South Africa;
“Real-time Risk Analysis
on the Internet”.
1998
-
VENTER, H.S.;
ELOFF, J.H.P.; 1998; Computers & Security; “Data Packet Intercepting
on the Internet: How and Why? A Closer Look at Existing Data
Packet-intercepting Tools”; Vol. 17 no. 8; pp. 683-692; Elsevier Science;
ISSN 0167-4048.
|