Social engineering attack examples, templates and scenarios F Mouton, L Leenen, HS Venter Computers & Security 59, 186-209, 2016 | 286 | 2016 |
Social engineering attack framework F Mouton, MM Malan, L Leenen, HS Venter 2014 Information Security for South Africa, 1-9, 2014 | 157* | 2014 |
Towards an ontological model defining the social engineering domain F Mouton, L Leenen, MM Malan, HS Venter ICT and Society: 11th IFIP TC 9 International Conference on Human Choice and …, 2014 | 127 | 2014 |
Social engineering attack detection model: SEADM M Bezuidenhout, F Mouton, HS Venter Information Security for South Africa (ISSA), 1-8, 2010 | 106 | 2010 |
Necessity for ethics in social engineering research F Mouton, MM Malan, KK Kimppa, HS Venter Computers & Security 55, 114-127, 2015 | 94 | 2015 |
Social engineering attack detection model: Seadmv2 F Mouton, L Leenen, HS Venter 2015 International Conference on Cyberworlds (CW), 216-223, 2015 | 53 | 2015 |
SEADer++: social engineering attack detection in online environments using machine learning M Lansley, F Mouton, S Kapetanakis, N Polatidis Journal of Information and Telecommunication 4 (3), 346-362, 2020 | 35 | 2020 |
A prototype for achieving digital forensic readiness on wireless sensor networks F Mouton, HS Venter AFRICON, 1-6, 2011 | 34 | 2011 |
Social engineering from a normative ethics perspective F Mouton, MM Malan, HS Venter Information Security for South Africa (ISSA), 1-8, 2013 | 29 | 2013 |
Development of cognitive functioning psychological measures for the SEADM F Mouton, MM Malan, HS Venter Information Security for South Africa (ISSA), 1-12, 2012 | 21 | 2012 |
Finite state machine for the social engineering attack detection model: SEADM F Mouton, A Nottingham, L Leenen, HS Venter SAIEE Africa Research Journal 109 (2), 133-148, 2018 | 20 | 2018 |
COVID-19: Impact on the cyber security threat landscape F Mouton, A de Coning Project: Social Engineering: Defining the field from Both an Attack and …, 2020 | 19 | 2020 |
Benchmarking a mobile implementation of the social engineering prevention training tool F Mouton, M Teixeira, T Meyer Information Security for South Africa (ISSA), 2017, 106-116, 2017 | 16 | 2017 |
Underlying finite state machine for the social engineering attack detection model F Mouton, A Nottingham, L Leenen, HS Venter Information Security for South Africa (ISSA), 2017, 98-105, 2017 | 13 | 2017 |
Web defacement and intrusion monitoring tool: Wdimt M Masango, F Mouton, P Antony, B Mangoale 2017 International Conference on Cyberworlds (CW), 72-79, 2017 | 11 | 2017 |
Requirements for wireless sensor networks in order to achieve digital forensic readiness F Mouton, HS Venter 6th International Workshop on Digital Forensics and Incident Analysis (WDFIA …, 2011 | 8 | 2011 |
Mapping the anatomy of social engineering attacks to the systems engineering life cycle J Van de Merwe, F Mouton CSCAN, 2017 | 6 | 2017 |
Context aware mobile application for mobile devices M Masango, F Mouton, A Nottingham, J Mtsweni 2016 Information Security for South Africa (ISSA), 85-90, 2016 | 6 | 2016 |
Social Engineering Attack Detection Model F Mouton University of Pretoria, 2018 | 4 | 2018 |
An approach for detecting web defacement with self-healing capabilities M Masango, F Mouton, P Antony, B Mangoale Transactions on Computational Science XXXII: Special Issue on Cybersecurity …, 2018 | 4 | 2018 |