GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing by Author "Vorster, J"

Sort by: Order: Results:

  • Veerasamy, N; Mokhonoana, PM; Vorster, J (2006-07)
    This paper proposes the use of a data mining techniques to analyse the data recorded by the honeypot. This data can also be used to train Intrusion Detection Systems (IDS) in identifying attacks. Since the training is based ...
  • Leenen, L; Vorster, J; Le Roux, WH (2010-04)
    The authors describe the first phase development of a path finding simulation in a military environment. This concept demonstrator can be used for mission planning by constructing what if scenarios to investigate trade-offs ...
  • Vorster, J; Van Heerden, R (2015-03)
    Graphical passwords schemas are becoming more main-stream. There are many different approaches to graphical passwords, each with its own drawbacks and advantages. There has been many studies to suggest that graphical ...
  • Peach, S; Vorster, J; Van Heerden, R (2010-05)
    In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully ...
  • Velupillai, HM; van Heerden, RP; Vorster, J (2007-09)
    Wireless networks face innovative intrusion methods that have never been focused on wired networks. This paper describes a simple inexpensive way to implement a wireless intrusion detection system. The system takes advantage ...