Author:Kukuni, TG; Markus, E; Kotze, B; Abu-Mahfouz, Adnan MIDate:Aug 2022The application of machine learning in resolving complex cyber-security challenges in smart manufacturing plant is growing. Network intrusion and anomaly detection is posing high risks in sensory data integrity and optimisation of processes ...Read more
Author:Ngobeni, Sipho J; Venter, HSDate:Sep 2008There are currently many different types of wireless crime investigation tools designed for different purposes in order to track down intruders of wireless crime, like Intrusion Detection Systems (IDSs), Wlan-Jack, HotSpotter, Monkey Jack, ...Read more