GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing by Author "Leenen, L"

Sort by: Order: Results:

  • Van Heerden, R; Leenen, L; Irwin, B (IEEE Xplore, 2013-11)
    In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network ...
  • Leenen, L; Ghose, A (Pacific Rim International Conference on Artificial Intelligence (PRICAI-08), 2008-12)
    The Semiring Constraint Satisfaction Problem (SCSP) framework is a popular approach for the representation of partial constraint satisfaction problems. Considerable research has been done in solving SCSPs, but limited work ...
  • Van Vuuren, JJ; Plint, G; Leenen, L; Zaaiman, J; Kadyamatimba, A; Phahlahmohlaka, J (2016)
    With the advancement of technology and proliferation of mobile and computing devices through all levels of society, cyber power is becoming an increasingly prominent driver in the attainment of national security for any ...
  • Van Heerden, RP; Irwin, B; Burke, ID; Leenen, L (IGI Global Publishing, 2012)
    Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of ...
  • Leenen, L; Terlunen, A; Le Roux, H (Taylor & Francis Group, 2012)
    In this chapter the authors present an algorithm to solve the Dynamic Military Unit Path Finding Problem (DMUPFP) which is based on Stentz’s well-known D* algorithm to solve dynamic path finding problems. The Military Unit ...
  • Leenen, L; Vorster, J; Le Roux, WH (2010-04)
    The authors describe the first phase development of a path finding simulation in a military environment. This concept demonstrator can be used for mission planning by constructing what if scenarios to investigate trade-offs ...
  • Aschmann, M; Jansen van Vuuren, J; Leenen, L (2015-03)
    Information in the Global Digital Industrial Economic Age is viewed as a strategic resource. This article focus on the establishment of cyber armies within the World Wide Web, commonly known as the Grid, with the emphases ...
  • Leenen, L; Alberts, R; Britz, K; Gerber, A; Meyer, T (2011-03)
    In this paper we describe a research project to develop an optimal information retrieval system in an Information Operations domain. Information Operations is the application and management of information to gain an advantage ...
  • Van Rooyen, S; Leenen, L (2011-09)
    Border safeguarding is the defence of territorial integrity and sovereignty, and this is a joint responsibility of the military and the police. Military doctrine for conventional warfare is not sufficient for Border ...
  • Jansen van Vuuren, JC; Leenen, L; Phahlamohlaka, J; Zaaiman, JJ (Academic Conferences and Publishing International, 2013-03)
    National governments have the responsibility to provide, regulate and maintain national security, which includes cybersecurity for their citizens. Although South Africa has recently published its first draft cybersecurity ...
  • Leenen, L; Terlunen, A (IEEE Xplore, 2013-11)
    The Military Unit Path Finding Problem (MUPFP) is the problem of finding a path from a starting point to a destination where a military unit has to move, or be moved, safely whilst avoiding threats and obstacles and ...
  • Jansen van Vuuren, JC; Phahlamohlaka, J; Leenen, L (Academic Conferences Limited, 2012-07)
    This paper investigates different government organisational structures created for the control of national cybersecurity in selected countries of the world. The main contribution is a proposed structure that could be ...
  • Leenen, L; Modise, M; Le Roux, WH (2009-03)
    This paper is part of a long term research project conducted by the Council for Scientific and Industrial Research (CSIR) in South Africa. The objective of the project is to construct a model for the planning and execution ...
  • Leenen, L; Anbulagan; Meyer, T; Ghose, A (Springer-Verlag, 2007-12)
    The authors present a variant of the Weighted Maximum Satisfiability Problem (Weighted Max-SAT), which is a modeling of the Semiring Constraint Satisfaction framework. They show how to encode a Semiring Constraint Satisfaction ...
  • Jansen van Vuuren, JC; Leenen, L; Grobler, MM; Chan, KFP; Khan, ZA (2015-03)
    Acquiring, representing, and managing knowledge effectively has a considerable impact on constructing accurate and intelligent systems. A challenge faced by domain experts is the manner in which information about the ...
  • Chan, P; Theron, J; Van Heerden, R; Leenen, L (2015-03)
    In modern warfare it is no longer sufficient to only focus on physical attacks and counter-measures; the threat against cyber networks is becoming increasingly significant. Modern military forces have to provide counter ...
  • Van Niekerk, B; Leenen, L; Ramluckan, T; Maharaj, M (Defence, Peace, Safety and Security Council for Scientific and Industrial Research also School of Management, IT, and Governance, University of KwaZulu-Natal, 2012-07)
    The Workshop on ICT Uses in Warfare and the Safeguarding of Peace is a note-worthy initiative that follows on three previous workshops: London (2007), Pretoria (2008), and Bela-Bela (2010). After the success of the workshops ...
  • Jansen van Vuuren, J; Grobler, M; Leenen, L; Phahlamohlaka, J (Springer, 2014-07)
    Most communications in the new era are dependent on Information and Communication Technology (ICT). In addition, infrastructure is becoming increasingly interconnected. This not only makes lives easier, but also leaves ...
  • Leenen, L; Meyer, T; Ghose, A (Elsevier Science B.V, 2007-03)
    The Semiring Constraint Satisfaction Problem (SCSP) framework is a popular approach for the representation of partial constraint satisfaction problems. In this framework preferences can be associated with tuples of values ...
  • Leenen, L; Meyer, T (IGI Global, 2016-07)
    The Governments, military forces and other organisations responsible for cybersecurity deal with vast amounts of data that has to be understood in order to lead to intelligent decision making. Due to the vast amounts of ...