Research: Publications

Publications on digital forensics

Publications are listed in reverse chronological order according to publication date. The publications listed on this page include all my publications from all listed areas of interests.

  • VAN STADEN, R. F.; VENTER, H.S.; 2011; “Using Performance Monitoring Software to Implement Digital Forensics Readiness”; 8th Annual IFIP WG 11.9 International Conference on Digital Forensics;  Pretoria, Gauteng, South Africa.

  • VAN STADEN, R.F.; VENTER, H.S.; 2011; “Adding digital forensic readiness to electronic communication using a security monitoring tool”; 2011 Information Security for South Africa (ISSA): Proceedings of the ISSA2011 Conference; Johannesburg, South Africa;
    ISBN 978-1-4577-1483-2.

  • VALJAREVIC, A.; VENTER, H.S.; 2011; “Towards a Digital Forensic Readiness Framework for Public Key Infrastructure Systems”; 2011 Information Security for South Africa (ISSA): Proceedings of the ISSA2011 Conference; Johannesburg, South Africa; ISBN 978-1-4577-1483-2.

  • SERRA, S.; VENTER, H.S.; 2011; “Mobile cyber-bullying and the children of South Africa: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness”; 2011 Information Security for South Africa (ISSA): Proceedings of the ISSA2011 Conference; Johannesburg, South Africa; ISBN 978-1-4577-1483-2.

  • MOUTON, F.; VENTER, H.S.; 2011; “Requirements for wireless sensor networks in order to achieve digital forensic readiness”; 6th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA); London, UK.

  • MOUTON, F.; VENTER, H.S.; 2011; “Achieving digital forensic readiness on wireless sensor networks”; IEEE Africon 2011; Livingstone, Zambia.

  • REDDY, K.; VENTER, H.S.; OLIVIER, M.S.; 2011; “Using Time-Driven Activity-Based Costing to Manage Digital Forensic Readiness for Information Privacy Incidents”; Information Systems Frontiers; Springer; ISSN 1387-3326.

  • VURAL, I.; VENTER, H.S.; 2011; “A Network Forensic Implementation for Detecting Mobile Botnets using Artificial Immune Systems”; 7th Annual IFIP WG 11.9 International Conference on Digital Forensics;  Orlando, Florida, USA.

  • VAN STADEN, R.F.; VENTER, H.S.; 2010; “Adding digital forensic readiness to the email trace header”; 2010 Information Security for South Africa: Proceedings of the ISSA 2010 Conference; Sandton, South Africa; ISBN 978-1-4244-5495-2.

  • VURAL, I.; VENTER, H.S.; 2010; “Using network forensics and artificial intelligence techniques to detect Bot-nets on an organizational network”; 7th International Conference on Information Technology: New Generations; Las Vegas, Nevada, USA; IEEE Computer Society; ISBN: 978-0-7695-3984-3.

  • VURAL, I.; VENTER, H.S.; 2010; “Mobile Botnet Detection using Network Forensics”; 3rd Future Internet Symposium 2010; Berlin, Germany; Springer; Lecture Notes in Computer Science, Vol. 6369/2010, 57-67, DOI: 10.1007/978-3-642-15877-3_7.

  • NGOBENI, S.; VENTER, H.S.; 2010; “The modelling of a forensic readiness approach to wireless LAN Forensics”; 6th Annual IFIP WG 11.9 International Conference on Digital Forensics;  Hong Kong, China.

  • VURAL, I.; VENTER, H.S.; 2009; “Investigating Identity Concealing and Email Tracing Techniques”; Information Security South Africa: Proceedings of the 2009 ISSA Conference; Johannesburg, South Africa; pp. 293-308; ISBN 978-1-86854-740-1.

  • NGOBENI, S.; VENTER, H.S.; 2009; “The Design of a Wireless Forensic Readiness Model (WFRM)”; Information Security South Africa: Proceedings of the 2009 ISSA Conference; Johannesburg, South Africa; pp. 455-466; ISBN 978-1-86854-740-1.

  • REDDY, K.; VENTER, H.S.; 2009; “Towards A Forensic Readiness Framework For Information Privacy Incidents”; 5th Annual IFIP WG 11.9 International Conference on Digital Forensics;  Orlando, Florida, USA.

  • ARTHUR, K.K.; OLIVIER, M.S.; VENTER, H.S.; ELOFF, J.H.P.; 2008; “Considerations Towards a Cyber Crime Profiling System”; Proceedings of AReS 2008 - The Third International Conference on Availability, Security and Reliability; pp. 1388-1393, IEEE.

  • ARTHUR, K.K.; OLIVIER, M.S.; VENTER, H.S.; 2007;  “Applying the Biba Integrity Model within a Forensic Evidence Management System”;  Third Annual IFIP WG 11.9 International Conference on Digital Forensics;  Orlando, Florida, USA.

  • FEI, B.K.L.; ELOFF, J.H.P.; OLIVIER, M.S.; VENTER, H.S.; 2006; "The use of self-organising maps for anomalous behaviour detection in a digital investigation"; Forensic Science International; In press.

  • FEI, B.L.K.; ELOFF, J.H.P.; OLIVIER, M.S.; VENTER, H.S.; 2006; “Network Forensics: Web Proxy Log Analysis”; Fifth Annual Digital Forensics Conference; Orlando, Florida, USA.

  • WOJCIK, M.; VENTER, H.S.; ELOFF, J.H.P.; 2006; “Trust-based Forensics”; Fifth Annual Digital Forensics Conference; Orlando, Florida, USA.

  • LAUBSCHER, R; RABE, D.; OLIVIER, M.S.; ELOFF, J.H.P.; VENTER, H.S.; 2005; First Annual IFIP WG 11.9 International Conference on Digital Forensics; “Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment”; Orlando, Florida, USA.

  • FEI, B.; ELOFF, J.H.P; VENTER, H.S.; OLIVIER, M.S.; 2005; First Annual IFIP WG 11.9 International Conference on Digital Forensics; “Exploring Data Generated by Computer Forensic Tools with Self-Organizing Maps”; Orlando, Florida, USA.

  • CROFT, N.J.; OLIVIER, M.S.; VENTER, H.S.; 2005; "Codec-Hopping: Secure and Private Voice Communication in Bandwidth Constrained Networks"; Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (IEEE SecPerU 2005); Santorini, Greece.

  • FEI, B.K.L; TILLWICK, H.; ELOFF, J.H.P.; VENTER, H.S.; OLIVIER, M.S.; 2005; “Using Self-Organising Maps for Anomalous Behaviour Detection in a Computer Forensic Investigation”; ISSA: Information Security South Africa Proceedings; Sandton, South Africa.

  • LAUBSCHER, R.; RABE, D.J.; OLIVIER, M.S.; ELOFF, J.H.P; VENTER, H.S.; 2005; “Computer forensics for a computer-based assessment: the preparation phase”; ISSA: Information Security South Africa Proceedings; Sandton, South Africa.

  • LAUBSCHER, R.; RABE, D.J.; OLIVIER, M.S.; ELOFF, J.H.P; VENTER, H.S.; 2005; “Computer Forensics for Computer-Based Assessment: The Preparation Phase”; SAICSIT: Annual Conference of the South African Institute of Computer Scientists & Information Technologists; White River; South Africa.

  • ARTHUR, K. K.; VENTER, H.S.; 2004; Peer-reviewed Proceedings of the ISSA 2004 enabling tomorrow Conference, Gallagher Estate, Johannesburg, South Africa; “An Investigation into Computer Forensic Tools”.

  • FEI, B. K. L.; VENTER, H.S.; ELOFF, J.H.P.; 2004; SAICSIT: Annual Conference of the South African Institute of Computer Scientists & Information Technologists, Protea Hotel, Stellenbosch, South Africa; “Classifying Computer Forensic Tools with the aim of Extending the Functionality of EnCase”.

   
 
 

Maintained by Hein Venter
Last updated on 2012/01/24 09:36:23 AM