Research 2010

Research Interest Home

Researchers Involved

Research Output

Postgraduate Student Projects

Back To

Department Research Interests

 

Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science

Computer and Information Security with specific reference to Distributed Systems Security and Privacy - Research Output

Research articles in refereed specialist journals:

Rossudowski AM, Venter HS, Eloff JHP, Kourie DG: 2010. A security privacy aware architecture and protocol for a single smart card used for multiple services. Computers & Security, 29, pp 393-409.

Da Veiga A, Eloff JHP: 2010. A framework and assessment instrument for information security culture. Computers & Security, 29 (2) / March, pp 196-207.

Zielinski MP, Olivier MS: 2010. On the use of economic price theory to find the optimum levels of privacy and information utility in non-perturbative microdata anonymisation. Data & Knowledge Engineering, 69, pp 399-423.

Croft NJ, Olivier MS: 2010. Sequenced release of privacy-accurate information in a forensic investigation. Digital Investigation, 7 / January, pp 95-101.

Papers in refereed, published conference proceedings:

Brandi W, Olivier MS: 2010. In Search of Search Privacy. In 7th International Conference, TrustBus 2010, Springer, pp 102-116.

Ngobeni SJ, Venter HS, Burke I: 2010. A Forensic Readiness Model for Wireless Networks. In Advances in Digital Forensics VI Sixth IFIP WG 11.9 International Conference on Digital Forensics, Springer, pp 107-117.

Vural I, Venter HS: 2010. Mobile Botnet Detection Using Network Forensics. In Future Internet - FIS2010, Springer, pp 57-67.

Reddy K, Venter HS: 2010. Information Privacy in Two Dimensions - Towards a Classification Scheme for Information Privacy Research. In IEEE International Conference on Social Computing (SocialCom 2010) & IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2010), IEEE, pp 973-980.

Burke I, Naidoo S, Olivier MS: 2010. Framework for Developing Realistic MANET Simulations. In Proceedings of the 5th International Conference on Information Warfare and Security, Academic Publishing Limited, pp 65-71.

Veerasamy N, Eloff JHP: 2010. Motivation and Requirements for Determinig a Network Warfare Capability. In Proceedings of the 9th European Conference on Information Warfare and Security, Academic Publishing Limited, pp 310-319.

Kotze DJJ, Olivier MS: 2010. Detecting XML Data Irregularities by Means of Lexical Analysis and Parsing. In Proceedings of the 9th European Conference on Information Warfare and Security, Academic Publishing Limited, pp 151-159.

Visage H, Olivier MS: 2010. A proposed model for explaining and educating Information and Computer Security principles. In Proceedings of the ISSA 2010 Conference, IEEE, pp 1-6.

Bezuidenhout M, Mouton F, Venter HS: 2010. Social Engineering Attack Detection Model: SEADM. In Proceedings of the ISSA 2010 Conference, IEEE, pp 1-8.

Van Staden FR, Venter HS: 2010. Adding digital forensic readiness to the email trace header. In Proceedings of the ISSA 2010 Conference, IEEE, pp 1-4.

Vural I, Venter HS: 2010. Using network forensics and artificial intelligence techniques to detect Bot-nets on an organizational network. In Proceedings of the Seventh International Conference on Information Technolgy (ITNG), IEEE / CPS, pp 725-731.

 

Related Links

Department of Computer Science Home Page