|
Research:
Publications
Publications on network security
Publications are listed in reverse
chronological order according to publication date. The publications listed on
this page include all my publications from all listed areas of interests.
-
DLAMINI, M.; ELOFF, J.H.P.;
ELOFF, M.M.; VENTER, H.S.; 2011; “A Cost Effective and Optimal
Information Security Budget”; Fifth International Symposium on Human
Aspects of Information Security & Assurance (HAISA); London, UK.
-
DLAMINI, M.;
VENTER, H.S.; ELOFF, J.H.P.; ELOFF, M.M.; 2011; " Security of Cloud
Computing: Seeing Through the Fog";
SATNAC: South African
Telecommunication Networks & Applications Conference;
East London Convention Centre, East London, South Africa.
-
GROBLER, M.;
FLOWERDAY, S.; VON SOLMS, R.; VENTER H.S.; "Cyber Awareness
Initiatives in South Africa: A National Perspective"; First IFIP TC9/TC11
Southern African Cyber Security Awareness Workshop (SACSAW11); Gaberone,
Botswana; ISBN: 978-0-620-50050-0; pp 32-41.
-
ROSSODOWSKI, A.M.;
VENTER, H.S.; ELOFF, J.H.P.; KOURIE, D.G; 2010; “A Security Privacy
Aware Architecture and Protocol for a Single Smart Card used for Multiple
Services”; Computers & Security; Vol. 29; pp. 393-409; Elsevier; ISSN
0167-4048.
-
VENTER, H.S.;
ELOFF, J.H.P.; WOJCIK, M.; 2008; “Implementing Prejudice in Trust Models: A
Prototype”;The 13th Nordic Workshop on Secure IT Systems; Copenhagen,
Denmark.
-
GRANT,
T.; VENTER, H.S.; ELOFF, J.H.P.; 2007; “Simulating adversarial
interactions between intruders and system administrators using OODA-RR”;
SAICSIT: Annual Conference of the South African Institute of Computer
Scientists & Information Technologists, Protea Hotel, Stellenbosch, South
Africa; Fish River Sun, South Africa.
-
ROSSUDOWSKI, A.M.;
VENTER, H.S.; ELOFF, J.H.P.; 2007; “Personal Anomaly-based Intrusion
Detection Smart Card Using Behavioural Analysis”; 22nd IFIPSEC
Conference on New Approaches for Security, Privacy and Trust in
Complex Environments; Sandton, South Africa.
-
ROSSUDOWSKI, A.M.;
VENTER, H.S.; 2007; “Secure Remote User Authentication over an Unsecure
Telecommunications Network”; 10th SATNAC: South African
Telecommunication Networks & Applications Conference; Sugar Beach,
Mauritius.
-
CROFT,
N.J.; OLIVIER, M.S.; VENTER, H.S.; 2005; "Codec-Hopping: Secure and
Private Voice Communication in Bandwidth Constrained Networks"; Workshop
on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (IEEE
SecPerU 2005); Santorini, Greece.
-
KELETA, Y.;
COETZEE, M.; ELOFF, J.H.P, VENTER, H.S.; 2005 “Proposing a Secure
XACML architecture ensuring privacy and trust”; ISSA: Information
Security South Africa Proceedings; Sandton, South Africa.
-
WOJCIK, M.;
VENTER, H.S.; ELOFF, J.H.P.; OLIVIER, M.S.; 2005; “Incorporating
Prejudice into Trust Models to Reduce Network Overload”; SATNAC: South
African Telecommunication Networks & Applications Conference; Champagne
Sports Resort, Drakensberg, South Africa.
-
OYOMNO, W.;
VENTER, H.S.; 2005; “Link Layer Type-Tagging in Fixed-Phrase Speaker
Verification Systems”; SATNAC: South African Telecommunication Networks &
Applications Conference; Champagne Sports Resort, Drakensberg, South
Africa.
-
TSHIVHASE,
F.E.; VENTER, H.S.; ELOFF, J.H.P; 2005; “Implementing Application and
Network Security using Aspect-oriented Programming”; SATNAC: South
African Telecommunication Networks & Applications Conference; Champagne
Sports Resort, Drakensberg, South Africa.
-
ROSSUDOWSKI,
A.M.; VENTER, H.S.; 2005; “The use of smart cards to perform ATM
transactions in an off-line environment”; SATNAC: South African
Telecommunication Networks & Applications Conference; Champagne Sports
Resort, Drakensberg, South Africa.
-
KELETA, Y. G.;
VENTER, H.S.;
ELOFF, J.H.P.; 2004; SAICSIT: Annual Conference of the South African
Institute of Computer Scientists & Information Technologists, Protea Hotel,
Stellenbosch, South Africa; “Web services security
policy
integration”.
-
VENTER, H.S.;
ELOFF, J.H.P.; 2003; Computers & Security; “A Taxonomy for
Information Security Technologies”; Vol. 22, No. 4; pp. 299-307; Elsevier
Science; ISSN 0167-4048.
-
VENTER, H.S.;
ELOFF, J.H.P.; 2000; IFIP/SEC: Information Security for Global
Information Infrastructures; “Network Security Health Checking”; ISBN
7-80003-466-6; pp. 287-220.
-
VENTER, H.S.;
ELOFF, J.H.P.; 2000; Network Security; “Network Security: Important
Issues”; Vol. 6 pp. 12-16; Elsevier Science; ISSN 1353-4858.
-
VENTER, H.S.;
ELOFF, J.H.P.; 2000; IT Indaba, RAU, South Africa;
“A Model for Network Reconfiguration”.
-
VENTER, H.S.;
ELOFF, J.H.P.; 1999;
Small Systems
Information Security Management & Small Systems Security;
“Real-time Risk Analysis on the Internet: A Prototype”; Kluwer Academic
Publishers; ISBN 0-7923-8626-4; pp. 11-27.
-
VENTER, H.S.;
ELOFF, J.H.P.; 1999; IT Indaba, RAU, South Africa;
“Real-time Risk Analysis
on the Internet”.
-
VENTER, H.S.;
ELOFF, J.H.P.; 1998; Computers & Security; “Data Packet Intercepting
on the Internet: How and Why? A Closer Look at Existing Data
Packet-intercepting Tools”; Vol. 17 no. 8; pp. 683-692; Elsevier Science;
ISSN 0167-4048.
|