Follow
Renier van Heerden
Renier van Heerden
CSIR, Pretoria
Verified email at csir.co.za
Title
Cited by
Cited by
Year
System inertia and Rate of Change of Frequency (RoCoF) with increasing non-synchronous renewable energy penetration
GA Chown, JG Wright, RP Van Heerden, M Coker
462017
Classifying network attack scenarios using an ontology
RP Van Heerden, B Irwin, I Burke
Proceedings of the 7th International Conference on Information-Warfare …, 2012
422012
A computer network attack taxonomy and ontology
RP Van Heerden, B Irwin, ID Burke, L Leenen
International Journal of Cyber Warfare and Terrorism (IJCWT) 2 (3), 12-25, 2012
362012
Long-term electricity sector expansion planning: A unique opportunity for a least cost energy transition in South Africa
JG Wright, T Bischof-Niemz, JR Calitz, C Mushwana, R Van Heerden
Renewable Energy Focus 30, 21-45, 2019
342019
Formal comments on the integrated resource plan (IRP) update assumptions, base case and observations 2016
JG Wright, JR Calitz, PR Van Heerden, ST Bischof-Niemz, C Mushwana, ...
322017
Formal comments on the Integrated Resource Plan (IRP) update assumptions, base case and observations
J Wright, T Bischof-Niemz, C Calitz, C Mushwana, R Van Heerden, ...
Council for Scientific and Industrial Research, Pretoria, 2017
232017
Automatic number plate segmentation and recognition
C Nieuwoudt, R Van Heerden
Seventh annual South African workshop on Pattern Recognition, 88-93, 1996
231996
Classification of cyber attacks in South Africa
R Van Heerden, S Von Soms, R Mooi
2016 IST-Africa Week Conference, 1-16, 2016
202016
Comparing Models of Offensive Cyber Operations
T Grant, I Burke, R van Heerden
Proceedings of the 7th International Warfare and Security, 108-121, 2012
192012
Automated classification of computer network attacks
R van Heerden, L Leenen, B Irwin
2013 International Conference on Adaptive Science and Technology, 1-7, 2013
162013
Major security incidents since 2014: An African perspective
R Van Heerden, S Von Solms, J Vorster
2018 IST-Africa Week Conference (IST-Africa), Page 1 of 11-Page 11 of 11, 2018
152018
Reference architecture for android applications to support the detection of manipulated evidence
H Pieterse, MS Olivier, RP Van Heerden
SAIEE Africa Research Journal 107 (2), 92-103, 2016
152016
Optimization of vehicle license plate segmentation and symbol recognition
RP Van Heerden, EC Botha
Department of Electrical, Electronic and Computer Engineering, University of …, 2010
132010
Optimization of vehicle license plate segmentation and symbol recognition
BEC van Heerden, R.P.
Twelfth Annual Symposium of the South African Pattern Recognition Association, 2001
13*2001
Playing hide-and-seek: Detecting the manipulation of Android Timestamps
H Pieterse, MS Olivier, RP van Heerden
Information Security for South Africa (ISSA), 2015
122015
Smartphone data evaluation model: Identifying authentic smartphone data
H Pieterse, M Olivier, R Van Heerden
Digital Investigation 24, 11-24, 2018
112018
Using an ontology for network attack planning
R van Heerden, P Chan, L Leenen, J Theron
International Journal of Cyber Warfare and Terrorism (IJCWT) 6 (3), 65-78, 2016
102016
The consequences of Edward Snowden NSA related information disclosures
S von Solms, R Van Heerden
ICCWS 2015—The Proceedings of the 10th International Conference on Cyber …, 2015
102015
Detecting manipulated smartphone data on Android and iOS Devices
H Pieterse, M Olivier, R Van Heerden
Information Security: 17th International Conference, ISSA 2018, Pretoria …, 2019
92019
Evaluating the authenticity of smartphone evidence
H Pieterse, M Olivier, R Van Heerden
Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International …, 2017
92017
The system can't perform the operation now. Try again later.
Articles 1–20