|
Research:
Publications
Publications on digital forensics
Publications are listed in reverse
chronological order according to publication date. The publications listed on
this page include all my publications from all listed areas of interests.
-
VAN STADEN, R. F.;
VENTER, H.S.; 2011; “Using Performance Monitoring Software to Implement
Digital Forensics Readiness”; 8th Annual IFIP WG 11.9
International Conference on Digital Forensics; Pretoria, Gauteng, South
Africa.
-
VAN STADEN, R.F.; VENTER,
H.S.; 2011; “Adding digital forensic readiness to electronic
communication using a security monitoring tool”; 2011 Information
Security for South Africa (ISSA): Proceedings of the ISSA2011 Conference;
Johannesburg, South Africa;
ISBN 978-1-4577-1483-2.
-
VALJAREVIC, A.; VENTER,
H.S.; 2011; “Towards a Digital Forensic Readiness Framework for Public
Key Infrastructure Systems”; 2011 Information Security for South Africa (ISSA):
Proceedings of the ISSA2011 Conference; Johannesburg, South Africa; ISBN
978-1-4577-1483-2.
-
SERRA, S.; VENTER, H.S.;
2011; “Mobile cyber-bullying and the children of South Africa: A proposal
for a pre-emptive approach to risk mitigation by employing digital forensic
readiness”; 2011 Information Security for South Africa (ISSA):
Proceedings of the ISSA2011 Conference; Johannesburg, South Africa; ISBN
978-1-4577-1483-2.
-
MOUTON, F.; VENTER, H.S.;
2011; “Requirements for wireless sensor networks in order to achieve digital
forensic readiness”; 6th International Annual Workshop on Digital
Forensics & Incident Analysis (WDFIA); London, UK.
-
MOUTON, F.; VENTER, H.S.;
2011; “Achieving digital forensic readiness on wireless sensor networks”;
IEEE Africon 2011; Livingstone, Zambia.
-
REDDY, K.; VENTER, H.S.;
OLIVIER, M.S.; 2011; “Using Time-Driven Activity-Based Costing to Manage
Digital Forensic Readiness for Information Privacy Incidents”;
Information
Systems Frontiers;
Springer; ISSN 1387-3326.
-
VURAL, I.; VENTER, H.S.;
2011; “A Network Forensic Implementation for Detecting Mobile Botnets using
Artificial Immune Systems”; 7th Annual IFIP WG 11.9
International Conference on Digital Forensics; Orlando, Florida, USA.
-
VAN STADEN, R.F.; VENTER,
H.S.; 2010; “Adding digital forensic readiness to the email trace
header”; 2010 Information Security for South Africa: Proceedings of the
ISSA 2010 Conference; Sandton, South Africa; ISBN 978-1-4244-5495-2.
-
VURAL, I.; VENTER, H.S.;
2010; “Using network forensics and artificial intelligence techniques to
detect Bot-nets on an organizational network”; 7th International
Conference on Information Technology: New Generations; Las Vegas,
Nevada, USA; IEEE Computer Society; ISBN: 978-0-7695-3984-3.
-
VURAL, I.; VENTER, H.S.;
2010; “Mobile Botnet Detection using Network Forensics”; 3rd Future
Internet Symposium 2010; Berlin, Germany; Springer; Lecture Notes in
Computer Science, Vol. 6369/2010, 57-67, DOI: 10.1007/978-3-642-15877-3_7.
-
NGOBENI, S.;
VENTER, H.S.; 2010; “The modelling of a forensic readiness approach
to wireless LAN Forensics”; 6th Annual IFIP WG 11.9
International Conference on Digital Forensics; Hong Kong, China.
-
VURAL, I.;
VENTER, H.S.; 2009; “Investigating Identity Concealing and Email
Tracing Techniques”; Information Security South Africa: Proceedings of
the 2009 ISSA Conference; Johannesburg, South Africa; pp. 293-308; ISBN
978-1-86854-740-1.
-
NGOBENI, S.;
VENTER, H.S.; 2009; “The Design of a Wireless Forensic Readiness
Model (WFRM)”; Information Security South Africa: Proceedings of the 2009
ISSA Conference; Johannesburg, South Africa; pp. 455-466; ISBN
978-1-86854-740-1.
-
REDDY, K.; VENTER, H.S.;
2009; “Towards A Forensic Readiness Framework For Information Privacy
Incidents”; 5th Annual IFIP WG 11.9 International Conference
on Digital Forensics; Orlando, Florida, USA.
-
ARTHUR, K.K.; OLIVIER, M.S.;
VENTER, H.S.; ELOFF, J.H.P.; 2008; “Considerations Towards a Cyber
Crime Profiling System”; Proceedings of AReS 2008 - The Third
International Conference on Availability, Security and Reliability; pp.
1388-1393, IEEE.
-
ARTHUR, K.K.; OLIVIER, M.S.;
VENTER, H.S.; 2007; “Applying the Biba Integrity Model within a
Forensic Evidence Management System”; Third Annual IFIP WG 11.9
International Conference on Digital Forensics; Orlando, Florida, USA.
-
FEI, B.K.L.;
ELOFF, J.H.P.; OLIVIER, M.S.; VENTER, H.S.;
2006; "The use of self-organising maps for anomalous behaviour detection in
a digital investigation"; Forensic Science International; In press.
-
FEI, B.L.K.;
ELOFF, J.H.P.; OLIVIER, M.S.; VENTER, H.S.; 2006; “Network Forensics: Web
Proxy Log Analysis”; Fifth Annual Digital Forensics Conference;
Orlando, Florida, USA.
-
WOJCIK, M.;
VENTER, H.S.; ELOFF, J.H.P.; 2006; “Trust-based Forensics”; Fifth Annual
Digital Forensics Conference; Orlando, Florida, USA.
-
LAUBSCHER,
R; RABE, D.; OLIVIER, M.S.; ELOFF, J.H.P.; VENTER, H.S.; 2005; First Annual IFIP WG 11.9 International Conference on Digital Forensics;
“Applying Computer Forensic Principles in Evidence Collection and Analysis
for a Computer-Based Programming Assessment”; Orlando, Florida, USA.
-
FEI, B.;
ELOFF, J.H.P; VENTER, H.S.; OLIVIER, M.S.; 2005; First Annual IFIP
WG 11.9 International Conference on Digital Forensics; “Exploring Data
Generated by Computer Forensic Tools with Self-Organizing Maps”; Orlando,
Florida, USA.
-
CROFT,
N.J.; OLIVIER, M.S.; VENTER, H.S.; 2005; "Codec-Hopping: Secure and
Private Voice Communication in Bandwidth Constrained Networks"; Workshop
on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (IEEE
SecPerU 2005); Santorini, Greece.
-
FEI, B.K.L;
TILLWICK, H.; ELOFF, J.H.P.; VENTER, H.S.; OLIVIER, M.S.; 2005;
“Using Self-Organising Maps for Anomalous Behaviour Detection in a Computer
Forensic Investigation”; ISSA: Information Security South Africa
Proceedings; Sandton, South Africa.
-
LAUBSCHER,
R.; RABE, D.J.; OLIVIER, M.S.; ELOFF, J.H.P; VENTER, H.S.; 2005;
“Computer forensics for a computer-based assessment: the preparation phase”;
ISSA: Information Security South Africa Proceedings; Sandton, South
Africa.
-
LAUBSCHER,
R.; RABE, D.J.; OLIVIER, M.S.; ELOFF, J.H.P; VENTER, H.S.; 2005;
“Computer Forensics for Computer-Based Assessment: The Preparation Phase”;
SAICSIT: Annual Conference of the South African Institute of Computer
Scientists & Information Technologists; White River; South Africa.
-
ARTHUR, K.
K.; VENTER, H.S.; 2004; Peer-reviewed Proceedings of the ISSA 2004
enabling tomorrow Conference, Gallagher Estate, Johannesburg, South Africa;
“An Investigation into Computer Forensic Tools”.
-
FEI, B. K.
L.; VENTER, H.S.; ELOFF, J.H.P.; 2004; SAICSIT: Annual Conference
of the South African Institute of Computer Scientists & Information
Technologists, Protea Hotel, Stellenbosch, South Africa; “Classifying
Computer Forensic Tools with the aim of Extending the Functionality of
EnCase”.
|