DSpace
 

Researchspace >

Browsing by Author Veerasamy, N

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:   
Sort by: In order: Results/Page Authors/Record:
Showing results 1 to 20 of 23
 next >
Issue DateTitleAuthor(s)
Jul-2008Application of non-quantitative modelling in the analysis of a network warfare environmentVeerasamy, N; Eloff, JHP
Jul-2006Applying data-mining techniques in honeypot analysisVeerasamy, N; Mokhonoana, PM; Vorster, J
Jul-2012Building an ontology for cyberterrorismVeerasamy, N; Grobler, M; Von Solms, B
Apr-2009Conceptual high-level framework of cyberterrorismVeerasamy, N
Oct-2010Countermeasures to consider in the combat against cyberterrorismVeerasamy, N; Grobler, M
Jul-2013Dangers of social networking sites- the propagation of malwareLabuschagne, WA; Veerasamy, N
Sep-2012The dark side of Web 2.0Labuschagne, WA; Eloff, MM; Veerasamy, N
May-2011Design of a cyber security awareness campaign for internet Caf├ęs users in rural areasLabuschagne, WA; Eloff, MM; Veerasamy, N; Mujinga, M
Aug-2011Design of cyber security awareness game utilizing a social media frameworkLabuschagne, WA; Burke, I; Veerasamy, N; Eloff, MM
Jul-2014Determination of meme proliferation factorsVeerasamy, N; Labuschagne, WA
Sep-2007Framework for the establishment of a HoneynetVeerasamy, N; Eloff, JP
Apr-2010High-level mapping of cyberterrorism to the OODA LoopVeerasamy, N
Dec-2009High-level methodology for carrying out combined red and blue teamsVeerasamy, N
Apr-2009Introduction to emerging threats and vulnerabilities to create user awarenessVeerasamy, N; Taute, B
Jun-2010Motivation and requirements for determining a Network Warfare CapabilityVeerasamy, N; Eloff, JHP
Aug-2010Motivation for cyberterrorismVeerasamy, N
Nov-2007Stealthy network transfer of dataVeerasamy, N; Cheyne, CJ
Mar-2011Terrorist use of the Internet: exploitation and support through ICT infrastructureVeerasamy, N; Grobler, M
Mar-2009Towards a Conceptual Framework for Cyber-terrorismVeerasamy, N
Aug-2012Towards a Cyberterrorism Life-Cycle (CLC) ModelVeerasamy, N; Grobler, M; Von Solms, S
Showing results 1 to 20 of 23
 next >

 

Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback