Follow
Johannes S. Vorster
Title
Cited by
Cited by
Year
Major security incidents since 2014: An African perspective
R Van Heerden, S Von Solms, J Vorster
2018 IST-Africa Week Conference (IST-Africa), Page 1 of 11-Page 11 of 11, 2018
152018
A constraint-based solver for the military unit path finding problem
L Leenen, JS Vorster, H le Roux
Proceedings of the 2010 Spring Simulation Multiconference, 25, 2010
112010
Using Markov Models to crack passwords
RP van Heerden, JS Vorster
The 3rd International Conference on Information Warfare and Security: Peter …, 2008
92008
Statistical analysis of large passwords lists, used to optimize brute force attacks
RP Van Heerden, JS Vorster
Proceedings of the 4th International Conference On Information Warfare and …, 2009
82009
A Framework for the Implementation of Graphical Passwords
JS Vorster
M.Sc., University of Liverpool, 2014
62014
Graphical Passwords: A Qualitative Study of Password Patterns
JS Vorster, RP van Heerden
The Proceedings of the 10th International Conference on Cyber Warfare and …, 2015
52015
Heuristic Attacks against graphical password generators
S Peach, JS Vorster, RP Van Heerden
Proceedings of the South African Information Security Multi-Conference …, 2010
52010
The Pattern-richness of Graphical Passwords
JS Vorster, RP van Heerden, B Irwin
Proceedings of the 15th International Information Security South Africa …, 2016
42016
A Study of Perceptions of Graphical Passwords
JS Vorster, RP Van Heerden
The Journal of Information Warfare 14 (3), 2015
32015
Network mapping and usage determination
FP Senekal, JS Vorster
Military Information Communications Simposium South Africa 2007, Pretoria …, 2007
32007
Consensus Simulator for Organisational Structures
JS Vorster, L Leenen
Proceedings of the 13th International Conference on Simulation and Modeling …, 2023
22023
Exploring the Effects of Subversive Agents on Consensus-seeking Processes using a Multi-agent Simulator
JS Vorster, L Leenen
Proceedings of the 13th International Conference on Simulation and Modeling …, 2023
12023
Violations of good security practices in graphical passwords schemes: Enterprise constraints on scheme-design
JS Vorster, B Irwin, RP Van Heerden
Proceedings of the 13th International Conference on Cyber Warfare and …, 2018
12018
Implementing Honeypots as Part of a Simple Cost Effective Wireless Intrusion Detection System
HM Velupillai, RP van Heerden, JS Vorster
Southern African Telecommunications Networks and Applications Conference …, 2007
12007
Applying data-mining techniques in honeypot analysis
N Veerasamy, PM Mokhonoana, JS Vorster
Information Security South Africa Conference (ISSA2006),1-5 July 2006, 2006
12006
Covert Subversive Agents and Consensus Disruption on Large Projects
J Vorster, L Leenen
International Conference on Cyber Warfare and Security 19 (1), 421-429, 2024
2024
Developing an Evaluation Framework for Authentication Schemes: Using Grounded Theory applied to Standards to develop a framework for authentication scheme evaluation, with …
JS Vorster
PhD, Rhodes University, 2023
2023
Information Warfare: An Information Manamgement Perspective
JS Vorster, R Van Heerden
IFIP TC9 Proceedings on ICT uses in Warfare and the Safeguarding of Peace, 76-83, 2008
2008
Statistical Analysis of Popular Passwords
R van Heerden, JS Vorster
IFIP TC9 Proceedings on ICT uses in Warfare and the Safeguarding of Peace …, 2008
2008
An innovative numerical algorithm for the calculation of intermittent building thermal loads
PG Rousseau, JS Vorster, EH Mathews
9th International Conference on Numerical Methods in Thermal Problems 9 (2 …, 1995
1995
The system can't perform the operation now. Try again later.
Articles 1–20