GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing by Author "Veerasamy, N"

Sort by: Order: Results:

  • Veerasamy, N; Eloff, JHP (2008-07)
    Network warfare is an emerging concept that focuses on the network and computer based forms through which information is attacked and defended. Various computer and network security concepts thus play a role in network ...
  • Veerasamy, N; Mokhonoana, PM; Vorster, J (2006-07)
    This paper proposes the use of a data mining techniques to analyse the data recorded by the honeypot. This data can also be used to train Intrusion Detection Systems (IDS) in identifying attacks. Since the training is based ...
  • Veerasamy, N; Grobler, M; Von Solms, B (Academic Publishing International, 2012-07)
    Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterrorism activities overlap with traditional hacking and Information and Communication Technology (ICT) Infrastructure ...
  • Veerasamy, N (Mindsystems, 2009-04)
    Uneasiness arises from the possibility of random cyber attacks. In the global information and network warfare battle, cyberterrorism has become a critical concern in that terrorists may seek to strike the innocent and wreak ...
  • Veerasamy, N; Grobler, M (CSIR. Defence Peace Safety and Security, 2010-10)
    Cyberterrorism addresses the convergence of the fear-causing world of terrorism with the abstract realm of cyberspace, computers and networks. While cyberterrorism can be executed using various technical security exploits, ...
  • Labuschagne, WA; Veerasamy, N (Ebsohost, 2013-07)
    The paper will illustrate the dangers of social networking malware through examples. In addition, the paper will discuss propagation techniques used in social networking malware. The aim of the paper is to create user ...
  • Labuschagne, WA; Eloff, MM; Veerasamy, N (Springer, 2012-09)
    Social networking sites have increased in popularity and are utilized for many purposes which include connecting with other people, sharing information and creating content. Many people on social networking sites use these ...
  • Labuschagne, WA; Eloff, MM; Veerasamy, N; Mujinga, M (2011-05)
    Africa may have the lowest number of Internet users in the world, but it also has the highest growth rate and the number of users is steadily growing. A majority of the African population is still excluded from global cyber ...
  • Labuschagne, WA; Burke, I; Veerasamy, N; Eloff, MM (2011-08)
    Social networking sites are a popular medium of interaction and communication. Social networking sites provide the ability to run applications and games to test users’ knowledge. The popularity of social networks makes it ...
  • Veerasamy, N; Labuschagne, WA (Academic conferences, 2014-07)
    The ubiquity of the Internet has become part of everyday life. The Intenet allows for the searching of information on topics that are relevant at that particular time. The possession of valuable information by members of ...
  • Veerasamy, N; Eloff, JP (2007-09)
    Honeypots are decoy machines that are placed on the network to attract attackers, whilst also distracting them from more important targets. Honeypots are thus an ideal medium for collecting data that can later be studied ...
  • Veerasamy, N (2010-04)
    The aim of this paper is to describe how various observations made by sections of the world population direct people into making decisions and committing acts of cyberterror. The paper will thus look at issues like the ...
  • Veerasamy, N (IEEE, 2009-12)
    This paper proposes a combined Red and Blue Team Methodology to guide the process of carrying out such security auditing and penetration testing tasks. Red and Blue Teams consist of various security auditing and penetration ...
  • Veerasamy, N; Labuschagne, WA (Journal of Information Warfare, 2015-01)
    The Internet provides the ideal platform to disseminate messages which could potentially sway the opinions and behaviour of people. The ease, convenience, and transmission capabilities of the Internet facilitate the seamless ...
  • Veerasamy, N; Taute, B (Information Security South Africa, 2009-04)
    With technological change and advancement, attackers are increasingly becoming more sophisticated in their attack strategies and techniques. Other global factors and developments also impact the line of attack. This paper ...
  • Veerasamy, N; Grobler, MM (IGI Global, 2015)
    The merging of terrorism with the cyber domain introduces the potential for using computers and networked technologies in cyberspace to carry out extremist activities. Despite the current debate on whether cyberterrorism ...
  • Veerasamy, N; Eloff, JHP (2010-06)
    Individual users and organisations need to be warned about the latest face of warfare that is not only being played out in the military networks, but also on the Internet and cyberspace. Consequently, Network Warfare has ...
  • Veerasamy, N (2010-08)
    Cyberterrorism represents the convergence of the virtual world of cyberspace and the intimidation techniques of terrorism. To better understand why cyber terrorist acts are committed, this paper investigates the motivation ...
  • Veerasamy, N; Cheyne, CJ (World Academy of Science, Engineering and Technology, 2007-11)
    Users of computer systems may often require the private transfer of messages/communications between parties across a network. However, unwanted interception/sniffing of such communications is also a possibility. An elementary ...
  • Veerasamy, N; Grobler, M (Academic Conferences Limited, 2011-03)
    The growth of technology has provided a wealth of functionality. One area in which Information Communication Technology (ICT), especially the Internet, has grown to play a supporting role is terrorism. The Internet provides ...