GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing by Author "Van Heerden, RP"

Sort by: Order: Results:

  • Burke, I; Van Heerden, RP (Academic Conferences International Limited, 2016-03)
    Cyber awareness training has become a growing industry, with more and more organisations starting to focus on training personnel on how to behave in a secure manner when engaging in cyber operations. Cyber challenges place ...
  • Van Heerden, RP; Irwin, B; Burke, ID (Academic Conferences Limited, 2012-03)
    This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer ...
  • Van Heerden, RP; Irwin, B; Burke, ID; Leenen, L (IGI Global Publishing, 2012)
    Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of ...
  • Von Solms, S; Van Heerden, RP (2015-03)
    In June 2013, the Guardian newspaper started to disclose thousands of classified documents, which uncovered the existence of several mass surveillance programmes run by the National Security Agency (NSA) in the USA in ...
  • Von Solms, S; Van Heerden, RP (2015-07)
    The development of the Network Emulation and Simulation Laboratory is motivated by the drive to contribute to the enhancement of the security and resilience of South Africa's critical information infrastructure. The goal ...
  • Van Heerden, RP; Pieterse, H; Burke, ID; Irwin, B (IEEE Xplore, 2013-11)
    Computer network attacks are difficult to simulate due to the damage they may cause to live networks and the complexity required simulating a useful network. We constructed a virtualised network within a vSphere ESXi ...
  • Pieterse, H; Olivier, MS; Van Heerden, RP (South African Institute of Electrical Engineers, 2016-06)
    Traces found on Android smartphones form a significant part of digital investigations. A key component of these traces is the date and time, often formed as timestamps. These timestamps allow the examiner to relate the ...
  • Van Heerden, RP; Bester, IM; Burke, ID (Mindsystems Pty Ltd., 2012-11)
    This study focuses on the security concerns of IPv6. A broad introduction to IPv6 is made then briefly the differences between the IPv6 and IPv4 protocols are looked at, their known vulnerabilities and this identifies some ...
  • Van Heerden, RP; Bester, IM; Burke, ID (2012-08)
    This study focuses on the security concerns of IPv6. We make a broad introduction to IPv6 then briefly look at the differences between the IPv6 and IPv4 protocols, their known vulnerabilities and identify some security ...
  • Van Heerden, RP; Vorster, JS (2009-03)
    The use of passwords has become endemic in everyday life, and passwords have penetrated most aspects of modern life. The purpose of this paper was to investigate the types of information that can be deduced from password ...