Hein S. Venter
Orcid: 0000-0002-3607-8630Affiliations:
- University of Pretoria, South Africa
According to our database1,
Hein S. Venter
authored at least 114 papers
between 1998 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on d-nb.info
-
on cs.up.ac.za
On csauthors.net:
Bibliography
2023
Proceedings of the Advances in Digital Forensics XIX, 2023
2022
Int. Trans. Oper. Res., 2022
Abnormality classification and localization using dual-branch whole-region-based CNN model with histopathological images.
Comput. Biol. Medicine, 2022
A distributed model for sharing tendering project information in the South African Local Government.
Proceedings of the International Conference on Cyberworlds, 2022
Proceedings of the CENTERIS 2022 - International Conference on ENTERprise Information Systems / ProjMAN - International Conference on Project MANagement / HCist, 2022
The Effect of Deep Learning Methods on Deepfake Audio Detection for Digital Investigation.
Proceedings of the CENTERIS 2022 - International Conference on ENTERprise Information Systems / ProjMAN - International Conference on Project MANagement / HCist, 2022
2021
Digital forensic readiness in operational cloud leveraging ISO/IEC 27043 guidelines on security monitoring.
Secur. Priv., 2021
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2021
2020
Detecting Centralized Architecture-Based Botnets using Travelling Salesperson Non-Deterministic Polynomial-Hard problem, TSP-NP Technique.
CoRR, 2020
Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud.
Proceedings of the NISS 2020: The 3rd International Conference on Networking, Information Systems & Security, Marrakech, Morocco, March 31, 2020
Proceedings of the NISS 2020: The 3rd International Conference on Networking, Information Systems & Security, Marrakech, Morocco, March 31, 2020
Proactive Forensics: Keystroke Logging from the Cloud as Potential Digital Evidence for Forensic Readiness Purposes.
Proceedings of the IEEE International Conference on Informatics, 2020
2019
Int. J. Mach. Learn. Cybern., 2019
Digital behavioral-fingerprint for user attribution in digital forensics: Are we there yet?
Digit. Investig., 2019
Proceedings of the Conference on Next Generation Computing Applications, 2019
A Conceptual Model for Consent Management in South African e-Health Systems for Privacy Preservation.
Proceedings of the Information and Cyber Security - 18th International Conference, 2019
Developing a Secure, Smart Microgrid Energy Market using Distributed Ledger Technologies.
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019
Proceedings of the Advances in Digital Forensics XV, 2019
2018
South Afr. Comput. J., 2018
Performance Costs of Software Cryptography in Securing New-Generation Internet of Energy Endpoint Devices.
IEEE Access, 2018
Towards an Integrated Digital Forensic Investigation Framework for an IoT-Based Ecosystem.
Proceedings of the 2018 IEEE International Conference on Smart Internet of Things (SmartIoT), 2018
The Current State of Electronic Consent Systems in e-Health for Privacy Preservation.
Proceedings of the Information Security - 17th International Conference, 2018
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018
2017
Proceedings of the 2017 Information Security for South Africa, 2017
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017
A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
High-level online user attribution model based on human Polychronic-Monochronic tendency.
Proceedings of the 2017 IEEE International Conference on Big Data and Smart Computing, 2017
2016
Understanding the Level of Compliance by South African Institutions to the Protection of Personal Information (POPI) Act.
Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2016
Proceedings of the CONF-IRM 2016, 2016
2015
A model for the design of next generation e-supply chain digital forensic readiness tools.
Proceedings of the 2015 Information Security for South Africa, 2015
Proceedings of the 2015 Information Security for South Africa, 2015
Evaluation and analysis of a software prototype for guidance and implementation of a standardized digital forensic investigation process.
Proceedings of the 2015 Information Security for South Africa, 2015
Proceedings of the Advances in Digital Forensics XI, 2015
Proceedings of the International Conference on Cyberworlds, 2015
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015
2014
Towards a prototype for guidance and implementation of a standardized digital forensic investigation process.
Proceedings of the 2014 Information Security for South Africa, 2014
Proceedings of the 2014 Information Security for South Africa, 2014
Proceedings of the 2014 Information Security for South Africa, 2014
Proceedings of the 2014 Information Security for South Africa, 2014
Proceedings of the Tenth International Network Conference, 2014
Proceedings of the ICT and Society, 2014
A cognitive approach for botnet detection using Artificial Immune System in the cloud.
Proceedings of the Third International Conference on Cyber Security, 2014
2013
J. Digit. Forensics Secur. Law, 2013
Comput. Secur., 2013
Implementation guidelines for a harmonised digital forensic investigation readiness process model.
Proceedings of the 2013 Information Security for South Africa, 2013
Proceedings of the 2013 Information Security for South Africa, 2013
Selection and ranking of remote hosts for digital forensic investigation in a Cloud environment.
Proceedings of the 2013 Information Security for South Africa, 2013
Testing the harmonised digital forensic investigation process model-using an Android mobile phone.
Proceedings of the 2013 Information Security for South Africa, 2013
Proceedings of the 2013 Information Security for South Africa, 2013
Proceedings of the 2013 Information Security for South Africa, 2013
Proceedings of the Advances in Digital Forensics IX, 2013
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013
Proceedings of the AFRICON 2013, Pointe aux Piments, Mauritius, September 9-12, 2013, 2013
2012
J. Univers. Comput. Sci., 2012
The Modelling of a Digital Forensic Readiness Approach for Wireless Local Area Networks.
J. Univers. Comput. Sci., 2012
Using time-driven activity-based costing to manage digital forensic readiness in large organisations.
Inf. Syst. Frontiers, 2012
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications.
ISC Int. J. Inf. Secur., 2012
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012
Proceedings of the 2012 Information Security for South Africa, 2012
Guidelines for procedures of a harmonised digital forensic process in network forensics.
Proceedings of the 2012 Information Security for South Africa, 2012
Measuring semantic similarity between digital forensics terminologies using web search engines.
Proceedings of the 2012 Information Security for South Africa, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
2011
Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities.
South Afr. Comput. J., 2011
Requirements for wireless sensor networks in order to achieve digital forensic readiness.
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011
Towards a Digital Forensics Readiness Framework for Public Key Infrastructure Systems.
Proceedings of the Information Security South Africa Conference 2011, 2011
Adding digital forensic readiness to electronic communication using a security monitoring tool.
Proceedings of the Information Security South Africa Conference 2011, 2011
Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness.
Proceedings of the Information Security South Africa Conference 2011, 2011
Proceedings of the Information Security South Africa Conference 2011, 2011
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011
Proceedings of the AFRICON 2011, 2011
2010
A security privacy aware architecture and protocol for a single smart card used for multiple services.
Comput. Secur., 2010
Information Privacy in Two Dimensions - Towards a Classification Scheme for Information Privacy Research.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Using Network Forensics and Artificial Intelligence Techniques to Detect Bot-nets on an Organizational Network.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010
Proceedings of the Information Security South Africa Conference 2010, 2010
Proceedings of the Information Security South Africa Conference 2010, 2010
Proceedings of the Advances in Digital Forensics VI, 2010
Proceedings of the Future Internet - FIS 2010, 2010
2009
Using Object-Oriented Concepts to Develop a High-Level Information Privacy Risk Management Model.
Proceedings of the Third International Conference on Emerging Security Information, 2009
Proceedings of the Information Security South Africa Conference 2009, 2009
The State of the Art of Spam and Anti-Spam Strategies and a Possible Solution using Digital Forensics.
Proceedings of the Information Security South Africa Conference 2009, 2009
Proceedings of the Information Security South Africa Conference 2009, 2009
Proceedings of the Advances in Digital Forensics V, 2009
2008
Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the New Approaches for Security, 2007
Simulating adversarial interactions between intruders and system administrators using OODA-RR.
Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2007
Proceedings of the Advances in Digital Forensics III, 2007
2006
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
2005
Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment.
Proceedings of the Advances in Digital Forensics, 2005
Proceedings of the Advances in Digital Forensics, 2005
2004
2003
South Afr. Comput. J., 2003
2002
Proceedings of the ISSA 2002 Information for Security for South-Africa 2nd Annual Conference, 2002
1999
Real-time Risk Analysis on the Internet: a prototype.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999
1998
Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools.
Comput. Secur., 1998