GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing by Author "Burke, ID"

Sort by: Order: Results:

  • Van Heerden, RP; Irwin, B; Burke, ID (Academic Conferences Limited, 2012-03)
    This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer ...
  • Le Roux, WH; Burke, ID (2009-05)
    Citation has always been a crucial part of research when it comes to accreditation for intellectual property. The maintenance of these references has mostly been the sole responsibility of the author to collect, maintain ...
  • Van Heerden, RP; Irwin, B; Burke, ID; Leenen, L (IGI Global Publishing, 2012)
    Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of ...
  • Van Heerden, RP; Pieterse, H; Burke, ID; Irwin, B (IEEE Xplore, 2013-11)
    Computer network attacks are difficult to simulate due to the damage they may cause to live networks and the complexity required simulating a useful network. We constructed a virtualised network within a vSphere ESXi ...
  • Burke, ID; Naidoo, S; Olivier, MS (2010-04)
    Mobile Ad hoc Networks have become an attractive option for military and disaster-response operations. Its ad hoc nature allows for fast deployment and requires no pre-existing network infrastructure. Most of the MANET ...
  • Van Heerden, RP; Bester, IM; Burke, ID (Mindsystems Pty Ltd., 2012-11)
    This study focuses on the security concerns of IPv6. A broad introduction to IPv6 is made then briefly the differences between the IPv6 and IPv4 protocols are looked at, their known vulnerabilities and this identifies some ...
  • Van Heerden, RP; Bester, IM; Burke, ID (2012-08)
    This study focuses on the security concerns of IPv6. We make a broad introduction to IPv6 then briefly look at the differences between the IPv6 and IPv4 protocols, their known vulnerabilities and identify some security ...