Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science
Computer and Information Security with specific reference to Distributed Systems Security and Privacy - Research Output
Research articles in refereed specialist journals:
Rossudowski AM, Venter HS, Eloff JHP, Kourie DG: 2010. A security privacy aware architecture and protocol for a single smart card used for multiple services. Computers & Security, 29, pp 393-409.
Da Veiga A, Eloff JHP: 2010. A framework and assessment instrument for information security culture. Computers & Security, 29 (2) / March, pp 196-207.
Zielinski MP, Olivier MS: 2010. On the use of economic price theory to find the optimum levels of privacy and information utility in non-perturbative microdata anonymisation. Data & Knowledge Engineering, 69, pp 399-423.
Croft NJ, Olivier MS: 2010. Sequenced release of privacy-accurate information in a forensic investigation. Digital Investigation, 7 / January, pp 95-101.
Papers in refereed, published conference proceedings:
Brandi W, Olivier MS: 2010. In Search of Search Privacy. In 7th International Conference, TrustBus 2010, Springer, pp 102-116.
Ngobeni SJ, Venter HS, Burke I: 2010. A Forensic Readiness Model for Wireless Networks. In Advances in Digital Forensics VI Sixth IFIP WG 11.9 International Conference on Digital Forensics, Springer, pp 107-117.
Vural I, Venter HS: 2010. Mobile Botnet Detection Using Network Forensics. In Future Internet - FIS2010, Springer, pp 57-67.
Reddy K, Venter HS: 2010. Information Privacy in Two Dimensions - Towards a Classification Scheme for Information Privacy Research. In IEEE International Conference on Social Computing (SocialCom 2010) & IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2010), IEEE, pp 973-980.
Burke I, Naidoo S, Olivier MS: 2010. Framework for Developing Realistic MANET Simulations. In Proceedings of the 5th International Conference on Information Warfare and Security, Academic Publishing Limited, pp 65-71.
Veerasamy N, Eloff JHP: 2010. Motivation and Requirements for Determinig a Network Warfare Capability. In Proceedings of the 9th European Conference on Information Warfare and Security, Academic Publishing Limited, pp 310-319.
Kotze DJJ, Olivier MS: 2010. Detecting XML Data Irregularities by Means of Lexical Analysis and Parsing. In Proceedings of the 9th European Conference on Information Warfare and Security, Academic Publishing Limited, pp 151-159.
Visage H, Olivier MS: 2010. A proposed model for explaining and educating Information and Computer Security principles. In Proceedings of the ISSA 2010 Conference, IEEE, pp 1-6.
Bezuidenhout M, Mouton F, Venter HS: 2010. Social Engineering Attack Detection Model: SEADM. In Proceedings of the ISSA 2010 Conference, IEEE, pp 1-8.
Van Staden FR, Venter HS: 2010. Adding digital forensic readiness to the email trace header. In Proceedings of the ISSA 2010 Conference, IEEE, pp 1-4.
Vural I, Venter HS: 2010. Using network forensics and artificial intelligence techniques to detect Bot-nets on an organizational network. In Proceedings of the Seventh International Conference on Information Technolgy (ITNG), IEEE / CPS, pp 725-731.
|