GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing by Author "Van Heerden, R"

Sort by: Order: Results:

  • Van Heerden, R; Leenen, L; Irwin, B (IEEE Xplore, 2013-11)
    In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network ...
  • Van Heerden, R; Von Soms, S; Mooi, R (IST Africa, 2016-05)
    This paper introduces a classification scheme for the visual classification of cyber attacks. Through the use of the scheme, the impact of various cyber attacks throughout the history of South Africa are investigated and ...
  • Grant, T; Burke, I; Van Heerden, R (Academic Conferences International Ltd, 2012-03)
    The purpose of this paper is to find, formalise, and compare models of the offensive cyber operations process available in the open scientific literature. Seven models were sufficiently well described for formalisation ...
  • Grant, T; Burke, I; Van Heerden, R (Academic Bookshop, 2015-10)
    Based on the idea that offensive cyber operations should be studied and merge from the darkness in which they typically hide, Grant and his colleagues embarked on a research program to explore the potential answers to the ...
  • Vorster, J; Van Heerden, R (2015-03)
    Graphical passwords schemas are becoming more main-stream. There are many different approaches to graphical passwords, each with its own drawbacks and advantages. There has been many studies to suggest that graphical ...
  • Peach, S; Vorster, J; Van Heerden, R (2010-05)
    In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully ...
  • Van Heerden, R; Pieterse, H; Irwin, B (Springer, 2012-09)
    This paper presents 8 of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack ...
  • Chan, P; Theron, J; Van Heerden, R; Leenen, L (2015-03)
    In modern warfare it is no longer sufficient to only focus on physical attacks and counter-measures; the threat against cyber networks is becoming increasingly significant. Modern military forces have to provide counter ...
  • Pieterse, H; Olivier, M; Van Heerden, R (IEEE, 2015-08)
    Mobile technology continues to evolve in the 21st century, providing users with improved capabilities and advance functionality. The current leader of this evolution is Android, a mobile operating system that continuously ...
  • Van Heerden, R; Chan, P; Leenen, L; Theron, J (IGI Global, 2016-09)
    The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning ...