Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Van Heerden, Renier"'
Publisher version
Conventional (text-based) passwords have shown patterns such as variations on the username, or known passwords such as “password”, “admin” or “12345”. Patterns may similarly be detected in the use of Graphical passw
Conventional (text-based) passwords have shown patterns such as variations on the username, or known passwords such as “password”, “admin” or “12345”. Patterns may similarly be detected in the use of Graphical passw
Externí odkaz:
http://hdl.handle.net/10962/68322
This paper presents a methodology using network attack ontology to classify computer-based attacks. Computer network attacks differ in motivation, execution and end result. Because attacks are diverse, no standard classification exists. If an attack
Externí odkaz:
http://hdl.handle.net/10962/d1009326
Autor:
Van Heerden, Renier Pelser
In this dissertation the problem of recognising vehicle licence plates of which the sym¬bols can not be segmented by standard image processing techniques is addressed. Most licence plate recognition systems proposed in the literature do not compensa
Externí odkaz:
http://hdl.handle.net/2263/29402
http://upetd.up.ac.za/thesis/available/etd-11112005-161130/
http://upetd.up.ac.za/thesis/available/etd-11112005-161130/
Publikováno v:
International Journal of Industrial Engineering and Operations Management, 2023, Vol. 5, Issue 2, pp. 77-85.
Autor:
Van Heerden, Renier Pelser
One of the most popular attack vectors against computers are their network connections. Attacks on computers through their networks are commonplace and have various levels of complexity. This research formally describes network-based computer attacks
Externí odkaz:
http://hdl.handle.net/10962/d1011603
Publikováno v:
In Digital Investigation March 2018 24:11-24
Publikováno v:
Proceedings of the International Conference on Cyber Warfare & Security; 2018, p487-496, 10p, 1 Color Photograph, 5 Diagrams, 1 Chart, 1 Graph
Publikováno v:
Proceedings of the European Conference on Cyber Warfare & Security; 2017, p82-91, 10p, 1 Diagram, 9 Charts, 2 Graphs, 1 Map
Publikováno v:
2016 Information Security for South Africa (ISSA); 2016, p69-76, 8p
Publikováno v:
Proceedings of the European Conference on Cyber Warfare & Security; 2016, p253-259, 7p, 3 Charts