Renier van Heerden

According to our database1, Renier van Heerden authored at least 13 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Evaluation of smartphone data using a reference architecture.
Int. J. Electron. Secur. Digit. Forensics, 2019

Classifying the Authenticity of Evaluated Smartphone Data.
Proceedings of the Advances in Digital Forensics XV, 2019

2018
Smartphone data evaluation model: Identifying authentic smartphone data.
Digit. Investig., 2018

Detecting Manipulated Smartphone Data on Android and iOS Devices.
Proceedings of the Information Security - 17th International Conference, 2018

2017
The World is Polluted With Leaked Cyber Data.
Int. J. Cyber Warf. Terror., 2017

Evaluating the Authenticity of Smartphone Evidence.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

2016
Using an Ontology for Network Attack Planning.
Int. J. Cyber Warf. Terror., 2016

The pattern-richness of Graphical passwords.
Proceedings of the 2016 Information Security for South Africa, 2016

2015
Playing hide-and-seek: Detecting the manipulation of Android Timestamps.
Proceedings of the 2015 Information Security for South Africa, 2015

2014
Human Perception of the Measurement of a Network Attack Taxonomy in Near Real-Time.
Proceedings of the ICT and Society, 2014

2012
A Computer Network Attack Taxonomy and Ontology.
Int. J. Cyber Warf. Terror., 2012

Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model.
Proceedings of the ICT Critical Infrastructures and Society, 2012

2010
Heuristic Attack on Graphic Password Generation.
Proceedings of the South African Information Security Multi-Conference, 2010


  Loading...