GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing by Author "Grobler, M"

Sort by: Order: Results:

  • Jansen van Vuuren, J; Grobler, M; Zaaiman, J (Academic Conferences Limited, 2012-03)
    In South Africa, cyber security has been identified as a critical component contributing towards National Security. More rural communities are becoming integrated into the global village due to increased hardware and ...
  • Swart, I; Irwin, B; Grobler, M (Academic Bookshop, UK, 2015-03)
    A proliferation of cyber security strategies have recently been published around the world with as many as thirty five strategies documented since 2009. These published strategies indicate the growing need to obtain a clear ...
  • Grobler, M; Swart, I (Springer, 2014-07)
    Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept ...
  • Grobler, M; Jansen van Vuuren, J; Zaaiman, J (International Institute of Informatics and Cybernetics, 2013)
    The international scope of the Internet, the fast technological advances, the wide reach of technological usage and the increase in cyber-attacks require the South African administrative and legislative system to both ...
  • Jansen van Vuuren, J; Grobler, M; Leenen, L; Phahlamohlaka, J (Springer, 2014-07)
    Most communications in the new era are dependent on Information and Communication Technology (ICT). In addition, infrastructure is becoming increasingly interconnected. This not only makes lives easier, but also leaves ...
  • Dlamini, I; Olivier, M; Grobler, M (2009-06)
    This paper extends work on a forensic model for traffic isolation based on Differentiated Services (DiffServ) and measures its performance by using a simulation. The simulated model has four basic components: traffic ...
  • Grobler, M (CSIR. Defence Peace Safety and Security, 2010-10)
    Strategic information security is becoming a more prominent aspect of modern day living. With the strong digital component that forms part of modern day business, the multiplicity of security risks and the emergence of ...
  • Veerasamy, N; Grobler, M (Academic Conferences Limited, 2011-03)
    The growth of technology has provided a wealth of functionality. One area in which Information Communication Technology (ICT), especially the Internet, has grown to play a supporting role is terrorism. The Internet provides ...
  • Grobler, M; Dlamini, Z; Ngobeni, S; Labuschagne, A (2011-08)
    A large portion of the South African rural community only have intermittent access to computers and are not familiar, nor entirely comfortable, with the use of internet communication or electronic devices. The research ...
  • Veerasamy, N; Grobler, M; Von Solms, S (CSIR also School of Management, IT, and Governance, University of KwaZulu-Natal, 2012-08)
    Cyberterrorism has emerged as a new threat in the Information and Communication Technology (ICT) landscape. The ease of use, affordability, remote capabilities and access to critical targets makes cyberterrorism a potential ...
  • Swart, I; Irwin, B; Grobler, M (IEEE Xplore, 2014-08)
    Attacks via the Internet infrastructure is increasingly becoming a daily occurrence and South Africa is no exception. In response, certain governments have published strategies pertaining to information security on a ...