GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing by Subject "Warfare"

Sort by: Order: Results:

  • Van Heerden, R; Leenen, L; Irwin, B (IEEE Xplore, 2013-11)
    In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network ...
  • Veerasamy, N (Mindsystems, 2009-04)
    Uneasiness arises from the possibility of random cyber attacks. In the global information and network warfare battle, cyberterrorism has become a critical concern in that terrorists may seek to strike the innocent and wreak ...
  • Veerasamy, N; Grobler, M (CSIR. Defence Peace Safety and Security, 2010-10)
    Cyberterrorism addresses the convergence of the fear-causing world of terrorism with the abstract realm of cyberspace, computers and networks. While cyberterrorism can be executed using various technical security exploits, ...
  • Grobler, M (CSIR. Defence Peace Safety and Security, 2010-10)
    Strategic information security is becoming a more prominent aspect of modern day living. With the strong digital component that forms part of modern day business, the multiplicity of security risks and the emergence of ...
  • Veerasamy, N (4th International Conference on Information Warfare and Security, 2009-03)
    Terrorism has entered a new wave in that the latest battleground to emerge is cyberspace. Cyber-terrorism reflects a current concern in the way terrorists will seek to strike the innocent and wreak havoc. Since explosives ...