GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing by Subject "Cyber warfare"

Sort by: Order: Results:

  • Grobler, M; Swart, I (Springer, 2014-07)
    Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept ...
  • Chan, P; Theron, J; Van Heerden, R; Leenen, L (2015-03)
    In modern warfare it is no longer sufficient to only focus on physical attacks and counter-measures; the threat against cyber networks is becoming increasingly significant. Modern military forces have to provide counter ...
  • Botha, P; Vawda, S; Ramadeen, P; Terlunen, A (2015-03)
    Military information systems require high levels of security to protect sensitive information within these systems. Encrypted private networks are a common method of securing such systems. However these networks are not ...
  • Leenen, L; Meyer, T (IGI Global, 2016-07)
    The Governments, military forces and other organisations responsible for cybersecurity deal with vast amounts of data that has to be understood in order to lead to intelligent decision making. Due to the vast amounts of ...
  • Labuschagne, WA (2012-10)
    As our dependence on information technology increases, cyber attacks are becoming complex. The attack vector is growing and there are definite digital footprint dangers. Understanding of threat is critical; and security ...
  • Van Heerden, R; Chan, P; Leenen, L; Theron, J (IGI Global, 2016-09)
    The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning ...