Research: Publications

Publications on vulnerability scanning and intrusion detection systems

Publications are listed in reverse chronological order according to publication date. The publications listed on this page include all my publications from all listed areas of interests.

  • MOUTON, F.; VENTER, H.S.; 2010; “Social Engineering Attack Detection Model: SEADM”; 2010 Information Security for South Africa: Proceedings of the ISSA 2010 Conference; Sandton, South Africa; ISBN 978-1-4244-5495-2.

  • VENTER, H.S.; ELOFF, J.H.P.; LI. Y.L.; 2008; “Standardising vulnerability categories”; Computers & Security; Vol. 27; pp. 71-83; Elsevier Limited; ISSN: 0167-4048.

  • VENTER, H.S.; ELOFF, J.H.P.; 2004; Computers & Security; “Vulnerability Forecasting – A Conceptual Model”; Vol. 23, No. 6; pp. 489-497; Elsevier Science; ISSN 0167-4048.

  • LI, Y.; VENTER, H.S.; ELOFF, J.H.P.; 2004; Peer-reviewed Proceedings of the ISSA 2004 enabling tomorrow Conference, Gallagher Estate, Johannesburg, South Africa; “Categorizing vulnerabilities using data clustering techniques”.

  • PILLAI, M. M.; VENTER, H.S.; ELOFF, J.H.P.; 2004; SAICSIT: Annual Conference of the South African Institute of Computer Scientists & Information Technologists, Protea Hotel, Stellenbosch, South Africa; “An Approach to Implement a Network Intrusion Detection System using Genetic Algorithms”.

  • VENTER, H.S.; ELOFF, J.H.P.; 2003; South African Computer Journal; “Evaluating Vulnerability Scanners Using Harmonised Vulnerability Categories”; pp. 40-45; No. 31; Computer Society of South Africa South Africa; ISSN 1015-7999.

  • VENTER, H.S.; ELOFF, J.H.P.; 2003; ICICT: International Conference on Information & Communication Technology, Cairo, Egypt; “State of the Art Vulnerability Detection and Suggestions for Improvement”.

  • VENTER, H.S.; ELOFF, J.H.P.; 2003; ISSA: Information Security South Africa Proceedings, Sandton Convention Centre, Johannesburg, South Africa; “Vulnerability Detection”.

  • VENTER, H.S.; ELOFF, J.H.P.; 2003; SAICSIT: Annual Conference of the South African Institute of Computer Scientists & Information Technologists, Indaba Hotel, Johannesburg, South Africa; “State of the Art Intrusion Detection and Vulnerability Scanning”.

  • VENTER, H.S.; ELOFF, J.H.P.; 2003; Network Security; “Assessment of Vulnerability Scanners”; Vol. 2003 pp. 11-16; Elsevier Science;
    ISSN 1353-4858.

  • VENTER, H.S.; ELOFF, J.H.P.; 2002; South African Computer Journal; “Harmonising Vulnerability Categories”; pp. 24-31; No. 29; Computer Society of South Africa South Africa; ISSN 1015-7999.

  • VENTER, H.S.; ELOFF, J.H.P.; 2002; Computers & Security; “Vulnerabilities Categories for Intrusion Detection Systems”; Vol. 21 no. 7, pp. 617-619; Elsevier Science; ISSN 0167-4048.

  • VENTER, H.S.; ELOFF, J.H.P.; 2002; ISSA: Information Security South Africa Proceedings, Misty Hills Conference Centre, Johannesburg, South Africa; “Generic Vulnerability Categories”.

  • VENTER, H.S.; ELOFF, J.H.P.; 2002; SAICSIT: Annual Conference of the South African Institute of Computer Scientists & Information Technologists, The Boardwalk Conference Centre, Port Elizabeth, South Africa; “Enabling Businesses to Evaluate Intrusion Detection Tools”.

  • VENTER, H.S.; ELOFF, J.H.P.; 2001; ISSA: Information Security South Africa, Magaliesberg Conference Centre, Johannesburg, South Africa; “Dynamic Intrusion Detection Systems”.

   
 
 

Maintained by Hein Venter
Last updated on 2012/01/24 09:43:17 AM