Research: Publications

Publications from all my research interests

Publications are listed in reverse chronological order according to publication date. The publications listed on this page include all my publications from all listed areas of interests.

2012

  • VAN STADEN, R. F.; VENTER, H.S.; 2011; “Using Performance Monitoring Software to Implement Digital Forensics Readiness”; 8th Annual IFIP WG 11.9 International Conference on Digital Forensics;  Pretoria, Gauteng, South Africa.

2011

  • OLIVIER, M.S.; ELOFF, J.H.P.; VENTER, H.S.; 2011; BOTES, M.E.; "Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities"; South African Computer Journal; No. 47; pp.47-57; South African Institute of Computer Scientists and Information Technologists; ISSN 1015-7999.

  • REDDY, K.; VENTER, H.S.; OLIVIER, M.S.; 2011; “Using Time-Driven Activity-Based Costing to Manage Digital Forensic Readiness for Information Privacy Incidents”; Information Systems Frontiers; Springer; ISSN 1387-3326.

  • VURAL, I.; VENTER, H.S.; 2011; “A Network Forensic Implementation for Detecting Mobile Botnets using Artificial Immune Systems”; 7th Annual IFIP WG 11.9 International Conference on Digital Forensics;  Orlando, Florida, USA.

  • GROBLER, M.; FLOWERDAY, S.; VON SOLMS, R.; VENTER H.S.;  "Cyber Awareness Initiatives in South Africa: A National Perspective"; First IFIP TC9/TC11 Southern African Cyber Security Awareness Workshop (SACSAW11);  Gaberone, Botswana; ISBN: 978-0-620-50050-0; pp 32-41.

  • DLAMINI, M.; ELOFF, J.H.P.; ELOFF, M.M.; VENTER, H.S.; 2011; “A Cost Effective and Optimal Information Security Budget”; Fifth International Symposium on Human Aspects of Information Security & Assurance (HAISA); London, UK.

  • MOUTON, F.; VENTER, H.S.; 2011; “Requirements for wireless sensor networks in order to achieve digital forensic readiness”; 6th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA); London, UK.

  • MOUTON, F.; VENTER, H.S.; 2011; “Achieving digital forensic readiness on wireless sensor networks”; IEEE Africon 2011; Livingstone, Zambia.

  • VAN STADEN, R.F.; VENTER, H.S.; 2011; “Adding digital forensic readiness to electronic communication using a security monitoring tool”; 2011 Information Security for South Africa (ISSA): Proceedings of the ISSA2011 Conference; Johannesburg, South Africa;
    ISBN 978-1-4577-1483-2.

  • VALJAREVIC, A.; VENTER, H.S.; 2011; “Towards a Digital Forensic Readiness Framework for Public Key Infrastructure Systems”; 2011 Information Security for South Africa (ISSA): Proceedings of the ISSA2011 Conference; Johannesburg, South Africa; ISBN 978-1-4577-1483-2.

  • SERRA, S.; VENTER, H.S.; 2011; “Mobile cyber-bullying and the children of South Africa: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness”; 2011 Information Security for South Africa (ISSA): Proceedings of the ISSA2011 Conference; Johannesburg, South Africa; ISBN 978-1-4577-1483-2.

  • DLAMINI, M.; VENTER, H.S.; ELOFF, J.H.P.; ELOFF, M.M.; 2011; " Security of Cloud Computing: Seeing Through the Fog";  SATNAC: South African Telecommunication Networks & Applications Conference; East London Convention Centre, East London, South Africa.

2010

  • ROSSODOWSKI, A.M.; VENTER, H.S.; ELOFF, J.H.P.; KOURIE, D.G; 2010; “A Security Privacy Aware Architecture and Protocol for a Single Smart Card used for Multiple Services”; Computers & Security; Vol. 29; pp. 393-409; Elsevier; ISSN 0167-4048.

  • NGOBENI, S.; VENTER, H.S.; 2010; “The modelling of a forensic readiness approach to wireless LAN Forensics”; 6th Annual IFIP WG 11.9 International Conference on Digital Forensics;  Hong Kong, China.

  • VURAL, I.; VENTER, H.S.; 2010; “Using network forensics and artificial intelligence techniques to detect Bot-nets on an organizational network”; 7th International Conference on Information Technology: New Generations; Las Vegas, Nevada, USA; IEEE Computer Society; ISBN: 978-0-7695-3984-3.

  • VURAL, I.; VENTER, H.S.; 2010; “Mobile Botnet Detection using Network Forensics”; 3rd Future Internet Symposium 2010; Berlin, Germany; Springer; Lecture Notes in Computer Science, Vol. 6369/2010, 57-67, DOI: 10.1007/978-3-642-15877-3_7.

  • REDDY, K.; VENTER, H.S.; 2010; "Information Privacy in Two Dimensions - Towards a Classification Scheme for Information Privacy Research"; 2010 IEEE Second International Conference on Social Computing; Minneapolis, Minnesota, USA.

  • VAN STADEN, R.F.; VENTER, H.S.; 2010; “Adding digital forensic readiness to the email trace header”; 2010 Information Security for South Africa: Proceedings of the ISSA 2010 Conference; Sandton, South Africa; ISBN 978-1-4244-5495-2.

  • MOUTON, F.; VENTER, H.S.; 2010; “Social Engineering Attack Detection Model: SEADM”; 2010 Information Security for South Africa: Proceedings of the ISSA 2010 Conference; Sandton, South Africa; ISBN 978-1-4244-5495-2.

2009

  • REDDY, K.; VENTER, H.S.; 2009; “Towards A Forensic Readiness Framework For Information Privacy Incidents”; 5th Annual IFIP WG 11.9 International Conference on Digital Forensics;  Orlando, Florida, USA.

  • MOUTON, F.; VENTER, H.S.; 2009; “A Secure Communication Protocol for Wireless Sensor Networks”; 8th Annual Security Conference; Las Vegas, Nevada, USA.

  • REDDY, K.; VENTER, H.S.; 2009; “Using Object-Oriented Concepts to Develop a High-Level Information Privacy Risk Management Model”; The Third International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2009);  Athens, Greece.

  • NGOBENI, S.; VENTER, H.S.; 2009; “The Design of a Wireless Forensic Readiness Model (WFRM)”; Information Security South Africa: Proceedings of the 2009 ISSA Conference; Johannesburg, South Africa; pp. 455-466; ISBN 978-1-86854-740-1.

  • VURAL, I.; VENTER, H.S.; 2009; “Investigating Identity Concealing and Email Tracing Techniques”; Information Security South Africa: Proceedings of the 2009 ISSA Conference; Johannesburg, South Africa; pp. 293-308; ISBN 978-1-86854-740-1.

2008

  • VENTER, H.S.; ELOFF, J.H.P.; LI. Y.L.; 2008; “Standardising vulnerability categories”; Computers & Security; Vol. 27; pp. 71-83; Elsevier Limited; ISSN: 0167-4048.

  • ARTHUR, K.K.; OLIVIER, M.S.; VENTER, H.S.; ELOFF, J.H.P.; 2008; “Considerations Towards a Cyber Crime Profiling System”; Proceedings of AReS 2008 - The Third International Conference on Availability, Security and Reliability; pp. 1388-1393, IEEE.

  • REDDY, K.; VENTER, H.S., M.S. OLIVIER, I. CURRIE; 2008; “Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy”; Sixth Annual Conference on Privacy, Security and Trust; Fredericton, New Brunswick, Canada.

  • VENTER, H.S.; ELOFF, J.H.P.; WOJCIK, M.; 2008; “Implementing Prejudice in Trust Models: A Prototype”;The 13th Nordic Workshop on Secure IT Systems; Copenhagen, Denmark.

2007

  • ARTHUR, K.K.; OLIVIER, M.S.; VENTER, H.S.; 2007;  “Applying the Biba Integrity Model within a Forensic Evidence Management System”;  Third Annual IFIP WG 11.9 International Conference on Digital Forensics;  Orlando, Florida, USA.

  • ROSSUDOWSKI, A.M.; VENTER, H.S.; ELOFF, J.H.P.; 2007; “Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis”; 22nd IFIPSEC Conference on New Approaches for Security, Privacy and Trust in Complex Environments; Sandton, South Africa.

  • ROSSUDOWSKI, A.M.; VENTER, H.S.; 2007; “Secure Remote User Authentication over an Unsecure Telecommunications Network”; 10th SATNAC: South African Telecommunication Networks & Applications Conference; Sugar Beach, Mauritius.

  • REDDY, K.; VENTER, H.S.; 2007; “Privacy Capability Maturity Models within Telecommunications Organisations”; 10th SATNAC: South African Telecommunication Networks & Applications Conference; Sugar Beach, Mauritius.

  • GRANT, T.; VENTER, H.S.; ELOFF, J.H.P.; 2007; “Simulating adversarial interactions between intruders and system administrators using OODA-RR”; SAICSIT: Annual Conference of the South African Institute of Computer Scientists & Information Technologists, Protea Hotel, Stellenbosch, South Africa; Fish River Sun, South Africa.

2006

  • FEI, B.K.L.; ELOFF, J.H.P.; OLIVIER, M.S.; VENTER, H.S.; 2006; "The use of self-organising maps for anomalous behaviour detection in a digital investigation"; Forensic Science International; In press.

  • WOJCIK, M.; ELOFF, J.H.P; VENTER, H.S.; 2006; "Trust Model Architecture: Defining Prejudice by Learning"; Lecture notes in Computer Science; The Third International Conference on Trust, Privacy & Security in Digital Business (TrustBus); pp 182-191; Springer; ISBN 3540377506.

  • WOJCIK, M.; VENTER, H.S.; ELOFF, J.H.P.; 2006 "Trust Model Evaluation Criteria: A Detailed Analysis of Trust Representation "; SATNAC: South African Telecommunication Networks & Applications Conference; Spier Conference Centre, Stellenbosch, South Africa.

  • WOJCIK, M.; VENTER, H.S.; ELOFF, J.H.P.; 2006 "Trust Model Evaluation Criteria: A Detailed Analysis of Trust Evaluation"; ISSA: Information Security South Africa Proceedings; Sandton, South Africa.

  • FEI, B.L.K.; ELOFF, J.H.P.; OLIVIER, M.S.; VENTER, H.S.; 2006; “Network Forensics: Web Proxy Log Analysis”; Fifth Annual Digital Forensics Conference; Orlando, Florida, USA.

  • WOJCIK, M.; VENTER, H.S.; ELOFF, J.H.P.; 2006; “Trust-based Forensics”; Fifth Annual Digital Forensics Conference; Orlando, Florida, USA.

2005

  • VENTER, H.S.; ELOFF, J.H.P; M.M. ELOFF; L. LABUSCHAGNE; 2004; Peer-reviewed proceedings of the ISSA 2005 New Knowledge Today Conference; ISBN 1-86854-625-X.

  • LAUBSCHER, R; RABE, D.; OLIVIER, M.S.; ELOFF, J.H.P.; VENTER, H.S.; 2005; First Annual IFIP WG 11.9 International Conference on Digital Forensics; “Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment”; Orlando, Florida, USA.

  • FEI, B.; ELOFF, J.H.P; VENTER, H.S.; OLIVIER, M.S.; 2005; First Annual IFIP WG 11.9 International Conference on Digital Forensics; “Exploring Data Generated by Computer Forensic Tools with Self-Organizing Maps”; Orlando, Florida, USA.

  • TILLWICK, H.; NEUMANN, T.; OLIVIER, M.S.; VENTER, H.S.; ELOFF, J.H.P.; 2005; Fifth International Network Conference (INC2005); “Polar: Proxies Collaborating to Achieve Anonymous Web Browsing”; Doryssa Bay, Samos, Greece.

  • VENTER, H.S.; OLIVIER, M.S.; ELOFF, J.H.P.; BOTES, M.E.; 2005; Fifth International Network Conference (INC2005); “Balancing Patient Privacy and Treatment Facility Accountability using a Centralised Pseudonymous HIV/AIDS Database”; Doryssa Bay, Samos, Greece.

  • MORKEL, T.; OLIVIER, M.S.; ELOFF, J.H.P.; VENTER, H.S.; 2005; "One-time Passwords in a Mobile Environment using Steganography"; Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (IEEE SecPerU 2005); Santorini, Greece.

  • CROFT, N.J.; OLIVIER, M.S.; VENTER, H.S.; 2005; "Codec-Hopping: Secure and Private Voice Communication in Bandwidth Constrained Networks"; Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (IEEE SecPerU 2005); Santorini, Greece.

  • KELETA, Y.; COETZEE, M.; ELOFF, J.H.P, VENTER, H.S.; 2005 “Proposing a Secure XACML architecture ensuring privacy and trust”; ISSA: Information Security South Africa Proceedings; Sandton, South Africa.

  • FEI, B.K.L; TILLWICK, H.; ELOFF, J.H.P.; VENTER, H.S.; OLIVIER, M.S.; 2005; “Using Self-Organising Maps for Anomalous Behaviour Detection in a Computer Forensic Investigation”; ISSA: Information Security South Africa Proceedings; Sandton, South Africa.

  • LAUBSCHER, R.; RABE, D.J.; OLIVIER, M.S.; ELOFF, J.H.P; VENTER, H.S.; 2005; “Computer forensics for a computer-based assessment: the preparation phase”; ISSA: Information Security South Africa Proceedings; Sandton, South Africa.

  • LAUBSCHER, R.; RABE, D.J.; OLIVIER, M.S.; ELOFF, J.H.P; VENTER, H.S.; 2005; “Computer Forensics for Computer-Based Assessment: The Preparation Phase”; SAICSIT: Annual Conference of the South African Institute of Computer Scientists & Information Technologists; White River; South Africa.

  • WOJCIK, M.; VENTER, H.S.; ELOFF, J.H.P.; OLIVIER, M.S.; 2005; “Incorporating Prejudice into Trust Models to Reduce Network Overload”; SATNAC: South African Telecommunication Networks & Applications Conference; Champagne Sports Resort, Drakensberg, South Africa.

  • OYOMNO, W.; VENTER, H.S.; 2005; “Link Layer Type-Tagging in Fixed-Phrase Speaker Verification Systems”; SATNAC: South African Telecommunication Networks & Applications Conference; Champagne Sports Resort, Drakensberg, South Africa.

  • TSHIVHASE, F.E.; VENTER, H.S.; ELOFF, J.H.P; 2005; “Implementing Application and Network Security using Aspect-oriented Programming”; SATNAC: South African Telecommunication Networks & Applications Conference; Champagne Sports Resort, Drakensberg, South Africa.

  • ROSSUDOWSKI, A.M.; VENTER, H.S.; 2005; “The use of smart cards to perform ATM transactions in an off-line environment”; SATNAC: South African Telecommunication Networks & Applications Conference; Champagne Sports Resort, Drakensberg, South Africa.

2004

  • VENTER, H.S.; ELOFF, J.H.P; M.M. ELOFF; L. LABUSCHAGNE; 2004; Peer-reviewed proceedings of the ISSA 2004 enabling tomorrow Conference; ISBN 1-86854-522-9.

  • VENTER, H.S.; ELOFF, J.H.P.; 2004; Computers & Security; “Vulnerability Forecasting – A Conceptual Model”; Vol. 23, No. 6; pp. 489-497; Elsevier Science; ISSN 0167-4048.

  • VENTER, H.S.; OLIVIER, M.S.; ELOFF, J.H.P.; 2004; Internet Research: Electronic Networking Applications and Policy; “PIDS: A Privacy Intrusion Detection System”; Vol. 14, No. 5; pp. 360-365; Emerald Group Publishing Limited; ISSN: 1066-2243.

  • VENTER, H.S.; OLIVIER, M. S.; ELOFF, J.H.P.; 2004; International Network Conference; “PIDS: A Privacy Intrusion Detection System”; Plymouth, United Kingdom.

  • LI, Y.; VENTER, H.S.; ELOFF, J.H.P.; 2004; Peer-reviewed Proceedings of the ISSA 2004 enabling tomorrow Conference, Gallagher Estate, Johannesburg, South Africa; “Categorizing vulnerabilities using data clustering techniques”.

  • ARTHUR, K. K.; VENTER, H.S.; 2004; Peer-reviewed Proceedings of the ISSA 2004 enabling tomorrow Conference, Gallagher Estate, Johannesburg, South Africa; “An Investigation into Computer Forensic Tools”.

  • PILLAI, M. M.; VENTER, H.S.; ELOFF, J.H.P.; 2004; SAICSIT: Annual Conference of the South African Institute of Computer Scientists & Information Technologists, Protea Hotel, Stellenbosch, South Africa; “An Approach to Implement a Network Intrusion Detection System using Genetic Algorithms”.

  • KELETA, Y. G.; VENTER, H.S.; ELOFF, J.H.P.; 2004; SAICSIT: Annual Conference of the South African Institute of Computer Scientists & Information Technologists, Protea Hotel, Stellenbosch, South Africa; “Web services security policy integration”.

  • FEI, B. K. L.; VENTER, H.S.; ELOFF, J.H.P.; 2004; SAICSIT: Annual Conference of the South African Institute of Computer Scientists & Information Technologists, Protea Hotel, Stellenbosch, South Africa; “Classifying Computer Forensic Tools with the aim of Extending the Functionality of EnCase”.

2003

  • VENTER, H.S.; ELOFF, J.H.P; M.M. ELOFF; L. LABUSCHAGNE; 2003; Information Security South Africa; ISBN 1-86854-485-0.

  • VENTER, H.S.; ELOFF, J.H.P.; 2003; Computers & Security; “A Taxonomy for Information Security Technologies”; Vol. 22, No. 4; pp. 299-307; Elsevier Science; ISSN 0167-4048.

  • VENTER, H.S.; ELOFF, J.H.P.; 2003; South African Computer Journal; “Evaluating Vulnerability Scanners Using Harmonised Vulnerability Categories”; pp. 40-45; No. 31; Computer Society of South Africa South Africa; ISSN 1015-7999.

  • VENTER, H.S.; ELOFF, J.H.P.; 2003; ICICT: International Conference on Information & Communication Technology, Cairo, Egypt; “State of the Art Vulnerability Detection and Suggestions for Improvement”.

  • VENTER, H.S.; ELOFF, J.H.P.; 2003; ISSA: Information Security South Africa Proceedings, Sandton Convention Centre, Johannesburg, South Africa; “Vulnerability Detection”.

  • VENTER, H.S.; ELOFF, J.H.P.; 2003; SAICSIT: Annual Conference of the South African Institute of Computer Scientists & Information Technologists, Indaba Hotel, Johannesburg, South Africa; “State of the Art Intrusion Detection and Vulnerability Scanning”.

  • VENTER, H.S.; ELOFF, J.H.P.; 2003; Network Security; “Assessment of Vulnerability Scanners”; Vol. 2003 pp. 11-16; Elsevier Science;
    ISSN 1353-4858.

2002

  • VENTER, H.S.; ELOFF, J.H.P.; 2002; South African Computer Journal; “Harmonising Vulnerability Categories”; pp. 24-31; No. 29; Computer Society of South Africa South Africa; ISSN 1015-7999.

  • VENTER, H.S.; ELOFF, J.H.P.; 2002; Computers & Security; “Vulnerabilities Categories for Intrusion Detection Systems”; Vol. 21 no. 7, pp. 617-619; Elsevier Science; ISSN 0167-4048.

  • VENTER, H.S.; ELOFF, J.H.P.; 2002; ISSA: Information Security South Africa Proceedings, Misty Hills Conference Centre, Johannesburg, South Africa; “Generic Vulnerability Categories”.

  • VENTER, H.S.; ELOFF, J.H.P.; 2002; SAICSIT: Annual Conference of the South African Institute of Computer Scientists & Information Technologists, The Boardwalk Conference Centre, Port Elizabeth, South Africa; “Enabling Businesses to Evaluate Intrusion Detection Tools”.

2001

  • VENTER, H.S.; ELOFF, J.H.P.; 2001; ISSA: Information Security South Africa, Magaliesberg Conference Centre, Johannesburg, South Africa; “Dynamic Intrusion Detection Systems”.

2000

  • VENTER, H.S.; ELOFF, J.H.P.; 2000; IFIP/SEC: Information Security for Global Information Infrastructures; “Network Security Health Checking”; ISBN 7-80003-466-6; pp. 287-220.

  • VENTER, H.S.; ELOFF, J.H.P.; 2000; Network Security; “Network Security: Important Issues”; Vol. 6 pp. 12-16; Elsevier Science;
    ISSN 1353-4858.

  • VENTER, H.S.; ELOFF, J.H.P.; 2000; IT Indaba, RAU, South Africa; “A Model for Network Reconfiguration”.

1999

  • VENTER, H.S.; ELOFF, J.H.P.; 1999; Small Systems Information Security Management & Small Systems Security; “Real-time Risk Analysis on the Internet: A Prototype”; Kluwer Academic Publishers; ISBN 0-7923-8626-4; pp. 11-27.

  • VENTER, H.S.; ELOFF, J.H.P.; 1999; IT Indaba, RAU, South Africa; “Real-time Risk Analysis on the Internet”.

1998

  • VENTER, H.S.; ELOFF, J.H.P.; 1998; Computers & Security; “Data Packet Intercepting on the Internet: How and Why?  A Closer Look at Existing Data Packet-intercepting Tools”; Vol. 17 no. 8; pp. 683-692; Elsevier Science; ISSN 0167-4048.

   

   
 
 

Maintained by Hein Venter
Last updated on 2012/01/24 09:08:52 AM