Follow
Francois Mouton
Francois Mouton
Noroff University College, University of the Western Cape
Verified email at noroff.no - Homepage
Title
Cited by
Cited by
Year
Social engineering attack examples, templates and scenarios
F Mouton, L Leenen, HS Venter
Computers & Security 59, 186-209, 2016
2842016
Social engineering attack framework
F Mouton, MM Malan, L Leenen, HS Venter
2014 Information Security for South Africa, 1-9, 2014
156*2014
Towards an ontological model defining the social engineering domain
F Mouton, L Leenen, MM Malan, HS Venter
ICT and Society: 11th IFIP TC 9 International Conference on Human Choice and …, 2014
1252014
Social engineering attack detection model: SEADM
M Bezuidenhout, F Mouton, HS Venter
Information Security for South Africa (ISSA), 1-8, 2010
1032010
Necessity for ethics in social engineering research
F Mouton, MM Malan, KK Kimppa, HS Venter
Computers & Security 55, 114-127, 2015
932015
Social engineering attack detection model: Seadmv2
F Mouton, L Leenen, HS Venter
2015 International Conference on Cyberworlds (CW), 216-223, 2015
532015
SEADer++: social engineering attack detection in online environments using machine learning
M Lansley, F Mouton, S Kapetanakis, N Polatidis
Journal of Information and Telecommunication 4 (3), 346-362, 2020
342020
A prototype for achieving digital forensic readiness on wireless sensor networks
F Mouton, HS Venter
AFRICON, 1-6, 2011
342011
Social engineering from a normative ethics perspective
F Mouton, MM Malan, HS Venter
Information Security for South Africa (ISSA), 1-8, 2013
262013
Development of cognitive functioning psychological measures for the SEADM
F Mouton, MM Malan, HS Venter
Information Security for South Africa (ISSA), 1-12, 2012
212012
Finite state machine for the social engineering attack detection model: SEADM
F Mouton, A Nottingham, L Leenen, HS Venter
SAIEE Africa Research Journal 109 (2), 133-148, 2018
202018
COVID-19: Impact on the cyber security threat landscape
F Mouton, A de Coning
Project: Social Engineering: Defining the field from Both an Attack and …, 2020
192020
Benchmarking a mobile implementation of the social engineering prevention training tool
F Mouton, M Teixeira, T Meyer
Information Security for South Africa (ISSA), 2017, 106-116, 2017
162017
Underlying finite state machine for the social engineering attack detection model
F Mouton, A Nottingham, L Leenen, HS Venter
Information Security for South Africa (ISSA), 2017, 98-105, 2017
122017
Web defacement and intrusion monitoring tool: Wdimt
M Masango, F Mouton, P Antony, B Mangoale
2017 International Conference on Cyberworlds (CW), 72-79, 2017
112017
Requirements for wireless sensor networks in order to achieve digital forensic readiness
F Mouton, HS Venter
6th International Workshop on Digital Forensics and Incident Analysis (WDFIA …, 2011
72011
Mapping the anatomy of social engineering attacks to the systems engineering life cycle
J Van de Merwe, F Mouton
CSCAN, 2017
52017
Context aware mobile application for mobile devices
M Masango, F Mouton, A Nottingham, J Mtsweni
2016 Information Security for South Africa (ISSA), 85-90, 2016
52016
An approach for detecting web defacement with self-healing capabilities
M Masango, F Mouton, P Antony, B Mangoale
Transactions on Computational Science XXXII: Special Issue on Cybersecurity …, 2018
42018
A Secure Communication Protocol for Wireless Sensor Networks
F Mouton, HS Venter
Proceedings of the Annual Security Conference "Security Assurance and …, 2009
42009
The system can't perform the operation now. Try again later.
Articles 1–20