ResearchSpace
Search
Login
All of ResearchSpace
Research Outputs
CSIR Publications
Archives Collection
Datasets
Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
ResearchSpace
→
Search
Search
Search:
All of ResearchSpace
Archives collection
CSIR Publications
Datasets
Research Publications/Outputs
Filters
Use filters to refine the search results.
Current Filters:
Title
Author
Subject
xmlui.ArtifactBrowser.SimpleSearch.filter.Publication_Type
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
New Filters:
Title
Author
Subject
xmlui.ArtifactBrowser.SimpleSearch.filter.Publication_Type
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Showing 6 out of a total of 6 results.
(0.005 seconds)
Now showing items 1-6 of 6
1
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Named entity recognition in a South African context
De Waal, AJ
;
Louis, AL
;
Venter, JP
(
2006-10
)
Best practice approach to live forensic acquisition
Grobler, MM
;
Von Solms, SH
(
2009-07
)
Modelling live forensic acquisition
Grobler, MM
;
Von Solms, SH
(
2009-06
)
Fighting cyber crime through cyber forensics first responder training
Venter, JP
;
Nare, S
(
CSIR
,
2008-11
)
Specializing CRISP-DM for evidence mining
Venter, JP
;
De Waal, A
;
Willers, N
(
SpringerLink.com
,
2007-01
)
Forensic challenges for handling incidents and crime in cyberspace
Taute, B
;
Grobler, M
;
Nare, S
(
2009-10
)
Now showing items 1-6 of 6
1
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
masked
Browse
All of ResearchSpace
Communities & Collections
By Issue Date
Authors
Titles
Subjects
Publication Type
Cluster
Impact Area
Discover
Author
Venter, JP (3)
Grobler, MM (2)
Nare, S (2)
Von Solms, SH (2)
De Waal, A (1)
De Waal, AJ (1)
Grobler, M (1)
Louis, AL (1)
Taute, B (1)
Willers, N (1)
Subject
Cyber forensics (6)
Cyber crime (2)
Forensic model (2)
Information security (2)
Liforac model (2)
Live forensic acquisition (2)
Artificial intelligence (1)
Bayesian networks (1)
Computer forensics (1)
Computer security incident response team (1)
... View More
Date Issued
2009 (3)
2006 (1)
2007 (1)
2008 (1)
Publication Type
Conference Presentation (5)
Book Chapter (1)
Back to top