GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing by Author "Irwin, B"

Sort by: Order: Results:

  • Van Heerden, R; Leenen, L; Irwin, B (IEEE Xplore, 2013-11)
    In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network ...
  • Jacobs, P; Arnab, A; Irwin, B (IEEE Xplore, 2013-08)
    Security Operation Centers (SOCs) are a necessary service for organisations that want to address compliance and threat management. While there are frameworks in existence that addresses the technology aspects of these ...
  • Van Heerden, RP; Irwin, B; Burke, ID (Academic Conferences Limited, 2012-03)
    This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer ...
  • Van Heerden, RP; Irwin, B; Burke, ID; Leenen, L (IGI Global Publishing, 2012)
    Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of ...
  • Van Heerden, RP; Pieterse, H; Burke, ID; Irwin, B (IEEE Xplore, 2013-11)
    Computer network attacks are difficult to simulate due to the damage they may cause to live networks and the complexity required simulating a useful network. We constructed a virtualised network within a vSphere ESXi ...
  • Frieslaar, Ibraheem; Irwin, B (IJCSIS, 2016-12)
    This research investigates the resistance of the multi-threaded countermeasure to side channel analysis (SCA) attacks. The multi-threaded countermeasure is attacked using the Correlation Power Analysis (CPA) and template ...
  • van Heerden, R; Malan, MM; Mouton, F; Irwin, B (Springer Berlin Heidelberg, 2014-07)
    This paper investigates how the measurement of a network attack taxonomy can be related to human perception. Network attacks do not have a time limitation, but the earlier its detected, the more damage can be prevented and ...
  • Frieslaar, Ibraheem; Irwin, B (ACM Digital Library, 2016-11)
    A state-of-the-art software countermeasure to defend against side channel attacks is investigated in this work. The implementation of this novel approach consists of using multithreads and a task scheduler on a microcontroller ...
  • Frieslaar, I; Irwin, B (2015-09)
    This paper investigates the power leakage of a smartcard. It is intended to answer two vital questions: what information is leaked out when different characters are used as output; and does the length of the ...
  • Van Heerden, R; Pieterse, H; Irwin, B (Springer, 2012-09)
    This paper presents 8 of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack ...
  • Swart, I; Irwin, B; Grobler, M (Academic Bookshop, UK, 2015-03)
    A proliferation of cyber security strategies have recently been published around the world with as many as thirty five strategies documented since 2009. These published strategies indicate the growing need to obtain a clear ...
  • Frieslaar, Ibraheem; Irwin, B (IEEE, 2016-10)
    This research investigates the use of a multi-threaded framework as a software countermeasure mechanism to prevent attacks on the verifypin process in a pin-acceptance program. The implementation comprises of using various ...
  • Peach, Schalk; Irwin, B; Van Heerden, Renier (2016-07)
    The objective of this paper is to assess the current state of Container-Based Emulator implementations on the Linux platform. Through a narrative overview, a selection of open source Container-Based emulators are analysed ...
  • Vorster, JS; Van Heerden, Renier P; Irwin, B (IEEE, 2016-08)
    Conventional (text-based) passwords have shown patterns such as variations on the username, or known passwords such as ”password”, ”admin” or ”12345”. Patterns may similarly be detected in the use of Graphical passwords ...
  • Swart, I; Irwin, B; Grobler, M (IEEE Xplore, 2014-08)
    Attacks via the Internet infrastructure is increasingly becoming a daily occurrence and South Africa is no exception. In response, certain governments have published strategies pertaining to information security on a ...
  • Frieslaar, I; Irwin, B (SCITEPRESS Digital Library, 2016-07)
    In this research we present a novel implementation for a software countermeasure to mitigate Correlation Power Analysis (CPA). This countermeasure combines pseudo controlled-random dummy code and a task scheduler using ...