Researchspace >

Browsing by Author Vorster, J

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:   
Sort by: In order: Results/Page Authors/Record:
Showing results 1 to 5 of 5
Issue DateTitleAuthor(s)
Jul-2006Applying data-mining techniques in honeypot analysisVeerasamy, N; Mokhonoana, PM; Vorster, J
Apr-2010Constraint-based solver for the Military unit path finding problemLeenen, L; Vorster, J; Le Roux, WH
Mar-2015Graphical passwords: a qualitative study of password patternsVorster, J; Van Heerden, R
May-2010Heuristic attacks against graphical password generatorsPeach, S; Vorster, J; Van Heerden, R
Sep-2007Implementing honeypots as part of a simple cost effective wireless intrusion detection systemVelupillai, HM; van Heerden, RP; Vorster, J
Showing results 1 to 5 of 5


Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback