GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing by Author "Pieterse, H"

Sort by: Order: Results:

  • Pieterse, H; Olivier, MS (Elsevier, 2014-09)
    Bluetooth is popular technology for short-range communications and is incorporated in mobile devices such as smartphones, tablet computers and laptops. Vulnerabilities associated with Bluetooth technology led to improved ...
  • Pieterse, H; Olivier, M (The Journal of Information Warfare, 2013-05)
    The increasing popularity and improvement in capabilities offered by smartphones caught the attention of botnet developers. Now the threat of botnets is moving towards the mobile environment. This study presents the design ...
  • Pieterse, H; Olivier, M (Academic Conferences and Publishing International Ltd, 2013-03)
    The increasing popularity and improvement in capabilities offered by smartphones caught the attention of botnet developers. Now the threat of botnets is moving towards the mobile environment. A mobile botnet is defined as ...
  • Van Heerden, RP; Pieterse, H; Burke, ID; Irwin, B (IEEE Xplore, 2013-11)
    Computer network attacks are difficult to simulate due to the damage they may cause to live networks and the complexity required simulating a useful network. We constructed a virtualised network within a vSphere ESXi ...
  • Pieterse, H; Burke, I (2015-03)
    Smartphones continue to excel in the 21st century due to the constant improvements of mobile technology. Advances in smartphones, such as increased computing power, improved device-to-device communication and the option ...
  • Burke, I; Pieterse, H (2015-03)
    The Android mobile market has expanded greatly in recent years, but with its increased market share Android became a popular target for malware developers. The latest Anti-Virus reports suggest that Android account for the ...
  • Van Heerden, R; Pieterse, H; Irwin, B (Springer, 2012-09)
    This paper presents 8 of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack ...
  • Pieterse, H; Olivier, M; Van Heerden, R (IEEE, 2015-08)
    Mobile technology continues to evolve in the 21st century, providing users with improved capabilities and advance functionality. The current leader of this evolution is Android, a mobile operating system that continuously ...
  • Pieterse, H; Olivier, MS; Van Heerden, RP (South African Institute of Electrical Engineers, 2016-06)
    Traces found on Android smartphones form a significant part of digital investigations. A key component of these traces is the date and time, often formed as timestamps. These timestamps allow the examiner to relate the ...
  • Pieterse, H; Olivier, MS (IEEE Xplore, 2013-08)
    Smartphones are an important asset for people living in the 21st century.With functionality similar to computers, smartphones have become all-in-one portable devices providing interconnectivity and device-to-device ...
  • Pieterse, H; Olivier, M (SpringerLink, 2014-01)
    Smartphones have become an integral part of people's lives during the last few years. Their wide range of capabilities and support of additional applications cause a wealth of information to be stored on these devices. ...
  • Pieterse, H (2012-10)
    Until recently, mobile phones remained free of the threat of botnets due to the isolation between mobile networks and the internet. The situation has changed significantly with the fast-growing popularity of ...