default search action
Francois Mouton
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j5]Arno de Coning, Alwyn J. Hoffman, Francois Mouton:
Traffic control centre optimisation on South African freight corridors through intelligent weigh-in-motion. South Afr. Comput. J. 35(1) (2023) - 2020
- [j4]Merton Lansley, Francois Mouton, Stelios Kapetanakis, Nikolaos Polatidis:
SEADer++: social engineering attack detection in online environments using machine learning. J. Inf. Telecommun. 4(3): 346-362 (2020) - [c19]Arno de Coning, Francois Mouton:
Data Processing Automation for Bulk Water Supply Monitoring. HCC 2020: 193-202
2010 – 2019
- 2018
- [j3]Mfundo Glenn Masango, Francois Mouton, Palesa Antony, Bokang Mangoale:
An Approach for Detecting Web Defacement with Self-healing Capabilities. Trans. Comput. Sci. 32: 29-42 (2018) - [c18]Francois Mouton, Michael Pepper, Thomas Meyer:
A Social Engineering Prevention Training Tool: Methodology and Design for Validating the SEADM. HAISA 2018: 12-27 - [c17]Muyowa Mutemwa, Francois Mouton:
Cyber security threats and mitigation techniques for multifunctional devices. ICTAS 2018: 1-6 - 2017
- [c16]Mfundo Glenn Masango, Francois Mouton, Palesa Antony, Bokang Mangoale:
Web Defacement and Intrusion Monitoring Tool: WDIMT. CW 2017: 72-79 - [c15]Johan van de Merwe, Francois Mouton:
Mapping the Anatomy of Social Engineering Attacks to the Systems Engineering Life Cycle. HAISA 2017: 24-40 - [c14]Luke Kingsley Bell, Francois Mouton, Tommie Meyer:
Mobile on-board vehicle event recorder: MOVER. ICTAS 2017: 1-7 - [c13]Francois Mouton, Alastair Nottingham, Louise Leenen, H. S. Venter:
Underlying finite state machine for the social engineering attack detection model. ISSA 2017: 98-105 - [c12]Francois Mouton, Marcel Teixeira, Thomas Meyer:
Benchmarking a mobile implementation of the social engineering prevention training tool. ISSA 2017: 106-116 - 2016
- [j2]Francois Mouton, Louise Leenen, H. S. Venter:
Social engineering attack examples, templates and scenarios. Comput. Secur. 59: 186-209 (2016) - [c11]Francois Mouton, Kiru Pillay, Carien Van 't Wout:
The Technological Evolution of Psychological Operations Throughout History. HAISA 2016: 266-278 - [c10]Mfundo Glenn Masango, Francois Mouton, Alastair Nottingham, Jabu Mtsweni:
Context Aware Mobile Application for mobile devices. ISSA 2016: 85-90 - 2015
- [j1]Francois Mouton, Mercia M. Malan, Kai K. Kimppa, H. S. Venter:
Necessity for ethics in social engineering research. Comput. Secur. 55: 114-127 (2015) - [c9]Francois Mouton, Louise Leenen, H. S. Venter:
Social Engineering Attack Detection Model: SEADMv2. CW 2015: 216-223 - 2014
- [c8]Francois Mouton, Louise Leenen, Mercia M. Malan, H. S. Venter:
Towards an Ontological Model Defining the Social Engineering Domain. HCC 2014: 266-279 - [c7]Renier van Heerden, Mercia M. Malan, Francois Mouton, Barry Irwin:
Human Perception of the Measurement of a Network Attack Taxonomy in Near Real-Time. HCC 2014: 280-292 - [c6]Francois Mouton, Mercia M. Malan, Louise Leenen, Hein S. Venter:
Social engineering attack framework. ISSA 2014: 1-9 - 2013
- [c5]Francois Mouton, Mercia M. Malan, Hein S. Venter:
Social engineering from a normative ethics perspective. ISSA 2013: 1-8 - 2012
- [c4]Francois Mouton, Mercia M. Malan, Hein S. Venter:
Development of Cognitive Functioning Psychological Measures for the SEADM. HAISA 2012: 40-51 - 2011
- [c3]Francois Mouton, H. S. Venter:
A prototype for achieving digital forensic readiness on wireless sensor networks. AFRICON 2011: 1-6 - [c2]Francois Mouton, Hein S. Venter:
Requirements for wireless sensor networks in order to achieve digital forensic readiness. WDFIA 2011: 108-121 - 2010
- [c1]Monique Bezuidenhout, Francois Mouton, Hein S. Venter:
Social Engineering Attack Detection Model: SEADM. ISSA 2010
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-05 21:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint