Francois Mouton

Orcid: 0000-0001-8804-7601

According to our database1, Francois Mouton authored at least 24 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Traffic control centre optimisation on South African freight corridors through intelligent weigh-in-motion.
South Afr. Comput. J., 2023

2020
SEADer++: social engineering attack detection in online environments using machine learning.
J. Inf. Telecommun., 2020

Data Processing Automation for Bulk Water Supply Monitoring.
Proceedings of the Human-Centric Computing in a Data-Driven Society, 2020

2018
An Approach for Detecting Web Defacement with Self-healing Capabilities.
Trans. Comput. Sci., 2018

Cyber security threats and mitigation techniques for multifunctional devices.
Proceedings of the 2018 Conference on Information Communications Technology and Society (ICTAS), 2018

A Social Engineering Prevention Training Tool: Methodology and Design for Validating the SEADM.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

2017
Benchmarking a mobile implementation of the social engineering prevention training tool.
Proceedings of the 2017 Information Security for South Africa, 2017

Underlying finite state machine for the social engineering attack detection model.
Proceedings of the 2017 Information Security for South Africa, 2017

Mobile on-board vehicle event recorder: MOVER.
Proceedings of the 2017 Conference on Information Communication Technology and Society (ICTAS), 2017

Mapping the Anatomy of Social Engineering Attacks to the Systems Engineering Life Cycle.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

Web Defacement and Intrusion Monitoring Tool: WDIMT.
Proceedings of the 2017 International Conference on Cyberworlds, 2017

2016
Social engineering attack examples, templates and scenarios.
Comput. Secur., 2016

Context Aware Mobile Application for mobile devices.
Proceedings of the 2016 Information Security for South Africa, 2016

The Technological Evolution of Psychological Operations Throughout History.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

2015
Necessity for ethics in social engineering research.
Comput. Secur., 2015

Social Engineering Attack Detection Model: SEADMv2.
Proceedings of the International Conference on Cyberworlds, 2015

2014
Social engineering attack framework.
Proceedings of the 2014 Information Security for South Africa, 2014

Towards an Ontological Model Defining the Social Engineering Domain.
Proceedings of the ICT and Society, 2014

Human Perception of the Measurement of a Network Attack Taxonomy in Near Real-Time.
Proceedings of the ICT and Society, 2014

2013
Social engineering from a normative ethics perspective.
Proceedings of the 2013 Information Security for South Africa, 2013

2012
Development of Cognitive Functioning Psychological Measures for the SEADM.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

2011
Requirements for wireless sensor networks in order to achieve digital forensic readiness.
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011

A prototype for achieving digital forensic readiness on wireless sensor networks.
Proceedings of the AFRICON 2011, 2011

2010
Social Engineering Attack Detection Model: SEADM.
Proceedings of the Information Security South Africa Conference 2010, 2010


  Loading...