Suivre
Renier van Heerden
Renier van Heerden
CSIR, Pretoria
Adresse e-mail validée de csir.co.za
Titre
Citée par
Citée par
Année
System inertia and Rate of Change of Frequency (RoCoF) with increasing non-synchronous renewable energy penetration
GA Chown, JG Wright, RP Van Heerden, M Coker
462017
Classifying network attack scenarios using an ontology
RP Van Heerden, B Irwin, I Burke
Proceedings of the 7th International Conference on Information-Warfare …, 2012
422012
A computer network attack taxonomy and ontology
RP Van Heerden, B Irwin, ID Burke, L Leenen
International Journal of Cyber Warfare and Terrorism (IJCWT) 2 (3), 12-25, 2012
362012
Long-term electricity sector expansion planning: A unique opportunity for a least cost energy transition in South Africa
JG Wright, T Bischof-Niemz, JR Calitz, C Mushwana, R Van Heerden
Renewable Energy Focus 30, 21-45, 2019
352019
Formal comments on the integrated resource plan (IRP) update assumptions, base case and observations 2016
JG Wright, JR Calitz, PR Van Heerden, ST Bischof-Niemz, C Mushwana, ...
322017
Formal comments on the Integrated Resource Plan (IRP) update assumptions, base case and observations
J Wright, T Bischof-Niemz, C Calitz, C Mushwana, R Van Heerden, ...
Council for Scientific and Industrial Research, Pretoria, 2017
232017
Automatic number plate segmentation and recognition
C Nieuwoudt, R Van Heerden
Seventh annual South African workshop on Pattern Recognition, 88-93, 1996
231996
Classification of cyber attacks in South Africa
R Van Heerden, S Von Soms, R Mooi
2016 IST-Africa Week Conference, 1-16, 2016
212016
Comparing Models of Offensive Cyber Operations
T Grant, I Burke, R van Heerden
Proceedings of the 7th International Warfare and Security, 108-121, 2012
192012
Automated classification of computer network attacks
R van Heerden, L Leenen, B Irwin
2013 International Conference on Adaptive Science and Technology, 1-7, 2013
162013
Major security incidents since 2014: An African perspective
R Van Heerden, S Von Solms, J Vorster
2018 IST-Africa Week Conference (IST-Africa), Page 1 of 11-Page 11 of 11, 2018
152018
Reference architecture for android applications to support the detection of manipulated evidence
H Pieterse, MS Olivier, RP Van Heerden
SAIEE Africa Research Journal 107 (2), 92-103, 2016
152016
Optimization of vehicle license plate segmentation and symbol recognition
BEC van Heerden, R.P.
Twelfth Annual Symposium of the South African Pattern Recognition Association, 2001
13*2001
Playing hide-and-seek: Detecting the manipulation of Android Timestamps
H Pieterse, MS Olivier, RP van Heerden
Information Security for South Africa (ISSA), 2015
122015
Smartphone data evaluation model: Identifying authentic smartphone data
H Pieterse, M Olivier, R Van Heerden
Digital Investigation 24, 11-24, 2018
112018
Using an ontology for network attack planning
R van Heerden, P Chan, L Leenen, J Theron
International Journal of Cyber Warfare and Terrorism (IJCWT) 6 (3), 65-78, 2016
102016
The consequences of Edward Snowden NSA related information disclosures
S von Solms, R Van Heerden
ICCWS 2015—The Proceedings of the 10th International Conference on Cyber …, 2015
102015
Detecting manipulated smartphone data on Android and iOS Devices
H Pieterse, M Olivier, R Van Heerden
Information Security: 17th International Conference, ISSA 2018, Pretoria …, 2019
92019
Evaluating the authenticity of smartphone evidence
H Pieterse, M Olivier, R Van Heerden
Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International …, 2017
92017
Using Markov Models to crack passwords
RP Van Heerden, JS Vorster
The 3rd International Conference on Information Warfare and Security: Peter …, 2008
92008
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20