Louise Leenen
Louise Leenen
Associate Professor, University of the Western Cape
Bestätigte E-Mail-Adresse bei uwc.ac.za
Titel
Zitiert von
Zitiert von
Jahr
Social engineering attack examples, templates and scenarios
F Mouton, L Leenen, HS Venter
Computers & Security 59, 186-209, 2016
1712016
Social engineering attack framework
F Mouton, MM Malan, L Leenen, HS Venter
2014 Information Security for South Africa, 1-9, 2014
962014
Towards an ontological model defining the social engineering domain
F Mouton, L Leenen, MM Malan, HS Venter
IFIP International Conference on Human Choice and Computers, 266-279, 2014
742014
Social engineering attack detection model: Seadmv2
F Mouton, L Leenen, HS Venter
2015 International Conference on Cyberworlds (CW), 216-223, 2015
302015
Ant colony induced decision trees for intrusion detection
FH Botes, L Leenen, R De La Harpe
16th European Conference on Cyber Warfare and Security, 53-62, 2017
272017
Implementation of a cyber security policy in South Africa: Reflection on progress and the way forward
M Grobler, JJ van Vuuren, L Leenen
IFIP International Conference on Human Choice and Computers, 215-225, 2012
252012
A computer network attack taxonomy and ontology
RP Van Heerden, B Irwin, ID Burke, L Leenen
International Journal of Cyber Warfare and Terrorism (IJCWT) 2 (3), 12-25, 2012
252012
Systematic withdrawal
T Meyer, J Heidema, W Labuschagne, L Leenen
Journal of Philosophical Logic 31 (5), 415-443, 2002
252002
Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa
JJ van Vuuren, L Leenen, J Zaaiman
The 9th International Conference on Cyber Warfare and Security, 107-115, 2014
152014
Automated classification of computer network attacks
R van Heerden, L Leenen, B Irwin
2013 International Conference on Adaptive Science and Technology, 1-7, 2013
152013
A constraint-based solver for the military unit path finding problem
L Leenen, J Vorster, H le Roux
Proceedings of the 2010 spring simulation multiconference, 1-8, 2010
152010
Finite state machine for the social engineering attack detection model: SEADM
F Mouton, A Nottingham, L Leenen, HS Venter
SAIEE Africa Research Journal 109 (2), 133-148, 2018
132018
Modeling and solving semiring constraint satisfaction problems by transformation to weighted semiring Max-SAT
L Leenen, A Anbulagan, T Meyer, A Ghose
Australasian Joint Conference on Artificial Intelligence, 202-212, 2007
122007
Relaxations of semiring constraint satisfaction problems
L Leenen, T Meyer, A Ghose
Information processing letters 103 (5), 177-182, 2007
112007
Artificial intelligence and big data analytics in support of cyber defense
L Leenen, T Meyer
Research Anthology on Artificial Intelligence Applications in Security, 1738 …, 2021
102021
Underlying finite state machine for the social engineering attack detection model
F Mouton, A Nottingham, L Leenen, HS Venter
2017 Information Security for South Africa (ISSA), 98-105, 2017
92017
Using an ontology for network attack planning
R van Heerden, P Chan, L Leenen, J Theron
International Journal of Cyber Warfare and Terrorism (IJCWT) 6 (3), 65-78, 2016
92016
Branch and bound algorithms to solve semiring constraint satisfaction problems
L Leenen, A Ghose
Pacific Rim International Conference on Artificial Intelligence, 991-997, 2008
82008
Social Engineering Attack Framework. 2014 Information Security for South Africa
F Mouton, MM Malan, L Leenen, HS Venter
Johannesburg, 2014
72014
An approach to governance of cybersecurity in South Africa
JJ van Vuuren, L Leenen, J Phahlamohlaka, J Zaaiman
Cyber behavior: concepts, methodologies, tools, and applications, 1583-1597, 2014
72014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20