GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing by Subject "Cyber warfare"

Sort by: Order: Results:

  • Botha, P; Vawda, S; Ramadeen, P; Terlunen, A (2015-03)
    Military information systems require high levels of security to protect sensitive information within these systems. Encrypted private networks are a common method of securing such systems. However these networks are not ...
  • Leenen, L; Meyer, T (IGI Global, 2016-07)
    The Governments, military forces and other organisations responsible for cybersecurity deal with vast amounts of data that has to be understood in order to lead to intelligent decision making. Due to the vast amounts of ...
  • Labuschagne, WA (2012-10)
    As our dependence on information technology increases, cyber attacks are becoming complex. The attack vector is growing and there are definite digital footprint dangers. Understanding of threat is critical; and security ...
  • Van Heerden, R; Chan, P; Leenen, L; Theron, J (IGI Global, 2016-09)
    The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning ...