ResearchSpace
Search
Login
All of ResearchSpace
Research Outputs
CSIR Publications
Archives Collection
Datasets
Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
ResearchSpace
→
Search
Search
Search:
All of ResearchSpace
Archives collection
CSIR Publications
Datasets
Research Publications/Outputs
Filters
Use filters to refine the search results.
Current Filters:
Title
Author
Subject
xmlui.ArtifactBrowser.SimpleSearch.filter.Publication_Type
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
New Filters:
Title
Author
Subject
xmlui.ArtifactBrowser.SimpleSearch.filter.Publication_Type
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Showing 10 out of a total of 37 results.
(0.011 seconds)
Now showing items 11-20 of 37
Previous Page
1
2
3
4
Next Page
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
A study of perceptions of graphical passwords
Vorster, JS
;
Van Heerden, Renier P
(
Peregrine Technical Solutions
,
2015-10
)
Evaluation framework for detecting manipulated smartphone data
Pieterse, Heloise
;
Oliver, DM
;
Van Heerden, Renier P
(
SAIEE
,
2019-06
)
Comparing models of offensive cyber operations
Grant, T
;
Burke, Ivan D
;
Van Heerden, Renier P
(
Academic Conferences International Ltd
,
2012-03
)
Evaluating the authenticity of smartphone evidence
Pieterse, Heloise
;
Olivier, Marius
;
Van Heerden, Renier P
(
Springer
,
2017-08
)
The world is polluted with leaked cyber data
Burke, Ivan D
;
Van Heerden, Renier P
(
IGI Global
,
2017-10
)
Implementing honeypots as part of a simple cost effective wireless intrusion detection system
Velupillai, HM
;
Van Heerden, Renier P
;
Vorster, J
(
2007-09
)
Rootkits, Trojans, backdoors and new developments
Decloedt, HE
;
Van Heerden, Renier P
(
CSIR. Defence Peace Safety and Security
,
2010-10
)
Playing hide-and-seek: detecting the manipulation of android timestamps
Pieterse, Heloise
;
Olivier, M
;
Van Heerden, Renier P
(
IEEE
,
2015-08
)
A computer network attack taxonomy and ontology
Van Heerden, Renier P
;
Irwin, B
;
Burke, Ivan D
;
Leenen, L
(
IGI Global Publishing
,
2012
)
Mapping the most significant computer hacking events to a temporal computer attack model
Van Heerden, Renier P
;
Pieterse, Heloise
;
Irwin, B
(
Springer
,
2012-09
)
Now showing items 11-20 of 37
Previous Page
1
2
3
4
Next Page
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
masked
Browse
All of ResearchSpace
Communities & Collections
By Issue Date
Authors
Titles
Subjects
Publication Type
Cluster
Impact Area
Discover
Author
Van Heerden, Renier P (37)
Burke, Ivan D (10)
Irwin, B (10)
Pieterse, Heloise (9)
Leenen, L (5)
Vorster, J (5)
Von Solms, S (4)
Olivier, M (3)
Vorster, JS (3)
Bester, IM (2)
... View More
Subject
Graphical passwords (5)
Information security (5)
Digital forensics (4)
Smartphone data (4)
Smartphones (4)
Access management (3)
Android (3)
Authenticity (3)
Computer network attacks (3)
Cyber warfare (3)
... View More
Date Issued
2020 - 2021 (1)
2010 - 2019 (34)
2007 - 2009 (2)
Publication Type
Conference Presentation (27)
Article (7)
Book Chapter (3)
Back to top