GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing by Author "Burke, I"

Sort by: Order: Results:

  • Burke, I; Van Heerden, RP (Academic Conferences International Limited, 2016-03)
    Cyber awareness training has become a growing industry, with more and more organisations starting to focus on training personnel on how to behave in a secure manner when engaging in cyber operations. Cyber challenges place ...
  • Grant, T; Burke, I; Van Heerden, R (Academic Conferences International Ltd, 2012-03)
    The purpose of this paper is to find, formalise, and compare models of the offensive cyber operations process available in the open scientific literature. Seven models were sufficiently well described for formalisation ...
  • Grant, T; Burke, I; Van Heerden, R (Academic Bookshop, 2015-10)
    Based on the idea that offensive cyber operations should be studied and merge from the darkness in which they typically hide, Grant and his colleagues embarked on a research program to explore the potential answers to the ...
  • Labuschagne, WA; Burke, I; Veerasamy, N; Eloff, MM (2011-08)
    Social networking sites are a popular medium of interaction and communication. Social networking sites provide the ability to run applications and games to test users’ knowledge. The popularity of social networks makes it ...
  • Pieterse, H; Burke, I (2015-03)
    Smartphones continue to excel in the 21st century due to the constant improvements of mobile technology. Advances in smartphones, such as increased computing power, improved device-to-device communication and the option ...
  • Ngobeni, S; Venter, H; Burke, I (Springer Berlin Heidelberg, 2010-01)
    Over the past decade, wireless mobile communications technology based on IEEE 802.11 wireless local area networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, ...
  • Burke, I; Pieterse, H (2015-03)
    The Android mobile market has expanded greatly in recent years, but with its increased market share Android became a popular target for malware developers. The latest Anti-Virus reports suggest that Android account for the ...
  • Oosthuizen, R; Burke, I; Roodt, J (CSIR. Defence Peace Safety and Security, 2010-10)
    This paper investigates the effect of different Command and Control Concepts (C2) on the outcome of military engagements. The C2 concepts from literature were found to be based on the OODA loop or derivatives thereof. Agent ...
  • Ngobeni, S; Venter, HS; Burke, I (2010-01)
    Over the past decade, wireless mobile communication technology based on IEEE 802.11 Wireless Local Area Networks (WLANs) has been adopted worldwide on a large scale, resulting in the increase of the wireless users. However, ...
  • Ngobeni, S; Venter, H; Burke, I (J.UCS Consortium, 2012-06)
    Over the past decade, wireless mobile communication technology based on the IEEE 802.11 Wireless Local Area Networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, ...