Researchspace >

Browsing by Author Grobler, M

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:   
Sort by: In order: Results/Page Authors/Record:
Showing results 5 to 24 of 24
< previous 
Issue DateTitleAuthor(s)
Aug-2010Common challenges faced during the establishment of a CSIRTGrobler, M; Bryk, H
Oct-2010Countermeasures to consider in the combat against cyberterrorismVeerasamy, N; Grobler, M
May-2011Cyber awareness initiatives in South Africa: a national perspectiveGrobler, M; Flowerday, S; von Solms, R; Venter, H
Mar-2012Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communitiesGrobler, M; Jansen van Vuuren, J; Zaaiman, J
Mar-2010Developing digital forensic governanceGrobler, M
Jul-2015E-CMIRC - towards a model for the integration of services between SOCs and CSIRTsJacobs, P; Von Solms, S; Grobler, M
Sep-2016Ethical and legal issues involved in the pro-active collection of personal information with the aim of reducing online disclosureBotha, J; Eloff, M; Grobler, M
Jul-2011Evaluating cyber security awareness in South AfricaGrobler, M; Jansen van Vuuren, J; Zaaiman, J
Oct-2009Forensic challenges for handling incidents and crime in cyberspaceTaute, B; Grobler, M; Nare, S
May-2012Global cyber trends a South African realityGrobler, M; Dlamini, Z
Mar-2012The influence of cyber security levels of South African citizens on national securityJansen van Vuuren, J; Grobler, M; Zaaiman, J
Jul-2014On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare DomainGrobler, M; Swart, I
2013Preparing South Africa for cyber crime and cyber defenseGrobler, M; Jansen van Vuuren, J; Zaaiman, J
Jul-2014Proposed model for a cybersecurity centre of innovation for South AfricaJansen van Vuuren, J; Grobler, M; Leenen, L; Phahlamohlaka, J
Jun-2009Simulation of logical traffic isolation using differentiated servicesDlamini, I; Olivier, M; Grobler, M
Oct-2010Strategic information security: facing the cyber impactGrobler, M
Mar-2011Terrorist use of the Internet: exploitation and support through ICT infrastructureVeerasamy, N; Grobler, M
Aug-2011Towards a cyber security aware rural communityGrobler, M; Dlamini, Z; Ngobeni, S; Labuschagne, A
Aug-2012Towards a Cyberterrorism Life-Cycle (CLC) ModelVeerasamy, N; Grobler, M; Von Solms, S
Aug-2014Towards a platform to visualize the state of South Africa's information securitySwart, I; Irwin, B; Grobler, M
Showing results 5 to 24 of 24
< previous 


Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback