Author:Pennefather, S; Irwin, Barry VWDate:Aug 2017This paper describes the design and application of Link, a Domain Specific Language (DSL) targeting the development of network applications focused on traffic manipulation at the frame level. The development of Link is described through the ...Read more
Author:Louw, J; Niezen, G; Ramotsoela, TD; Abu-Mahfouz, Adnan MIDate:Dec 2016Wireless sensor networks (WSNs) have become increasingly popular in many applications across a broad range of fields. Securing WSNs poses unique challenges mainly due to their resource constraints. Traditional public key cryptography (PKC) ...Read more
Author:Delport, JPDate:May 2007This dissertation describes the experiments performed and the techniques developed in order to identify network nodes and the connections between these nodes. The product of the investigation was the formulation of an algorithm and heuristic ...Read more
Author:Sweeney, M; Irwin, Barry VWDate:Sep 2017As networks have grown, so has the data available for monitoring and security purposes. This increase in volume has raised significant challenges for administrators in terms of how to identify threats in amongst the large volumes of network ...Read more
Author:Ramotsoela, DT; Hancke, GP; Abu-Mahfouz, Adnan MIDate:Jan 2023The move towards renewable energy and technological advancements in the generation, distribution and transmission of electricity have increased the popularity of microgrids. The popularity of these decentralised applications has coincided ...Read more
Author:Pearson, D; Irwin, Barry VW; Herbert, ADate:Sep 2017Malicious entities are constantly trying their luck at exploiting known vulnerabilities in web services, in an attempt to gain access to resources unauthorized access to resources. For this reason security specialists deploy various network ...Read more