Author:Veerasamy, Namosha; Eloff, JPDate:Sep 2007Honeypots are decoy machines that are placed on the network to attract attackers, whilst also distracting them from more important targets. Honeypots are thus an ideal medium for collecting data that can later be studied to analyse attackers’ ...Read more
Author:Brown, Dane; Bradshaw, KDate:May 2016There are a lack of multi-modal biometric fusion guidelines at the feature-level. This paper investigates face and fingerprint features in the form of their strengths and weaknesses. This serves as a set of guidelines to authors that are ...Read more
Author:Badenhorst, Danielle PDate:06 Sep 2023Reliance on digital technologies for innovation management is unavoidable in current contexts. While digital processes and business models have been prioritised as key factors to drive innovation and value creation within firms, cybersecurity ...Read more
Author:Combrink, CJ; Venter, CJ; Govender, S; Alshareef, MADate:May 2011A reconfigurable Control and Monitoring Framework (CMF) was developed, integrated and tested with a Radar Signal Processor (RSP). The methods and processes used to develop and utilise the CMF are highlighted in the context of a complete Control ...Read more
Author:Dlamini, ZI; Olivier, MS; Grobler, MMDate:Mar 2016According to the 2013 report by the ITU, the total mobile cellular subscriptions are expected to reach close to the landmark figure of 7 billion by the end of 2014, more than half of which are found in the developing countries (eMarketer, ...Read more
Author:Mouton, F; Malany, MM; Leenen, l; Venter, HSDate:Jul 2014The field of information security is a fast growing; discipline. Even though the effectiveness of security measures; to protect sensitive information is increasing, people remain; susceptible to manipulation and the human element is thus a; ...Read more