Researchspace >

Browsing by Author Leenen, L

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:   
Sort by: In order: Results/Page Authors/Record:
Showing results 1 to 20 of 25
 next >
Issue DateTitleAuthor(s)
Nov-2013Automated classification of computer network attacksVan Heerden, R; Leenen, L; Irwin, B
Dec-2008Branch and bound algorithms to solve semiring constraint satisfaction problemsLeenen, L; Ghose, A
2016Building blocks for national cyberpowerVan Vuuren, JJ; Plint, G; Leenen, L; Zaaiman, J; Kadyamatimba, A; Phahlahmohlaka, J
2012A computer network attack taxonomy and ontologyVan Heerden, RP; Irwin, B; Burke, ID; Leenen, L
Apr-2010Constraint-based solver for the Military unit path finding problemLeenen, L; Vorster, J; Le Roux, WH
2012A constraint programming solution for the military unit path finding problemLeenen, L; Terlunen, A; Le Roux, H
Mar-2015Cyber armies: the unseen military in the gridAschmann, M; Jansen van Vuuren, J; Leenen, L
Mar-2011Developing a knowledge system for information operationsLeenen, L; Alberts, R; Britz, K; Gerber, A; Meyer, T
Sep-2011Developing a simulation for border safeguardingVan Rooyen, S; Leenen, L
Mar-2013Development of a South African cybersecurity policy implementation frameworkJansen van Vuuren, JC; Leenen, L; Phahlamohlaka, J; Zaaiman, JJ
Nov-2013A focussed dynamic path finding algorithm with constraintsLeenen, L; Terlunen, A
Jul-2012Governance of cybersecurity in South AfricaJansen van Vuuren, JC; Phahlamohlaka, J; Leenen, L
Mar-2009Model for peace support operations: an overview of the ICT and interoperability requirementsLeenen, L; Modise, M; Le Roux, WH
Dec-2007Modeling and solving semiring constraint satisfaction problems by transformation to weighted semiring Max-SATLeenen, L; Anbulagan; Meyer, T; Ghose, A
Mar-2015Modelling the cybersecurity environment using morphological ontology design engineeringJansen van Vuuren, JC; Leenen, L; Grobler, MM; Chan, KFP; Khan, ZA
Mar-2015An ontological knowledge base for cyber network attack planningChan, P; Theron, J; Van Heerden, R; Leenen, L
Jul-2012Proceedings of the 4th Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2012 (IWSP 2012), Protea Hotel Balalaika, Sandton, 16 August 2012Van Niekerk, B; Leenen, L; Ramluckan, T; Maharaj, M
Jul-2014Proposed model for a cybersecurity centre of innovation for South AfricaJansen van Vuuren, J; Grobler, M; Leenen, L; Phahlamohlaka, J
Mar-2007Relaxations of semiring constraint satisfaction problemsLeenen, L; Meyer, T; Ghose, A
Jul-2016Semantic technologies and big data analytics for cyber defenceLeenen, L; Meyer, T
Showing results 1 to 20 of 25
 next >


Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback