Author:Mkuzangwe, Nenekazi N; Dawood, Zubeida CDate:Jun 2020Cyber-threat information-sharing tools, through which cybersecurity teams share threat information, are essential to combatting today's increasingly frequent and sophisticated cyber-attacks. Several cyber-threat information-sharing standards ...Read more
Author:Mapimele, Fikile V; Mangoale, Bokang CDate:Feb 2019In recent years, cybercrime has become one of the most rapidly growing areas of crime. The emergence of new technologies has presented new cybercrime opportunities that are becoming more sophisticated. As a result, imdividuals, corporations ...Read more
Author:Sithole, Happy M; Staphorst, L; Vahed, AnwarDate:Oct 2015Cyberinfrastructure is a combination of massive processing capability, high-speed connectivity, massive storage facilities and highly skilled personnel. Leading nations have invested significantly in these facilities and closely aligned them ...Read more
Author:Mutemwa, Muyowa; Mtsweni, Jabu SDate:Mar 2022A Cybersecurity Operation Centre (SOC) is a centralized hub within an organisation that houses people, processes, and technologies aimed at continuous monitoring of the organization’s assets in order to prevent, detect, analyse, and respond ...Read more
Author:Botha, JacoDate:2017This presentation discusses Cybersecurity as an enabler and pre-requisite for industry 4.0. A figure of the progression of cyber and physical threats for each industrial revolution has evolved is discussed.Read more
Author:Gcaza, NoluxoloDate:Aug 2018Information and communication technologies (ICTs) are responsible for the transformation of societies, nations and the world at large. ICTs are considered to improve the quality of life for citizens as they bring about easiness and usefulness ...Read more
Author:Veerasamy, NamoshaDate:Sep 2020Technological advancements continue to progress and so too grows the prospect of cyberterrorism. Hacking tools are growing in sophistication, and agitated terrorist groups may look for an innovative outlet for their political, religious or ...Read more
Author:Jansen van Rensburg, Gerhardus J; Kok, S; Wilke, DNDate:Oct 2016A constitutive model that captures the dominant strengthening and softening physics or microstructural changes of metallic materials is needed within a numerical environment for the effective prediction and simulation of plasticity during hot ...Read more
Author:Adekanmi, AE; Fouché, Gerda; Steenkamp, VDate:Sep 2012Boophane disticha of the family Amaryllidaceae is used traditionally by the indigenous people of southern Africa in the treatment of several neurological disorders. Weak decoctions of bulb scales are given to sedate violent, psychotic patients ...Read more
Author:Butgereit, L; Botha, RADate:May 2010The mobile phone is quickly becoming the personal computer of Africa. In Africa the cell phone is widely used, for example, in banking, crime prevention, tracking applications for identification documents, and education. C³TO is an architecture ...Read more
Author:Butgereit, L; Botha, RADate:Mar 2010To the mathematics teachers who are comfortable with expressions like Ө, φ, Σ and Δ t, the terms “mxit”, “chatter bot”, “xmpp”, and “jabber” may sound like Greek to them. Although recent research has shown that primary and secondary school ...Read more
Author:Olivrin, G; Van Der Walt, WDate:Sep 2009This paper investigates how video playback can be introduced in DAISY by building on the DAISY 3 standard and on existing open-source software. The paper presents the process of creating and authoring a video-based sign language DAISY publication ...Read more
Author:Butgereit, LDate:Oct 2011South Africa is a semi-arid country and water resources need to be monitored. The Internet of Things is the phenomenon of more and more things (as opposed to people and services) becoming connected to the Internet. This paper describes a ...Read more
Author:Labuschagne, WA; Veerasamy, NamoshaDate:Jul 2013The paper will illustrate the dangers of social networking malware through examples. In addition, the paper will discuss propagation techniques used in social networking malware. The aim of the paper is to create user awareness to minimise ...Read more
Author:Baumbach, J; Coetzee, EM; Sieberhagen, RH; Jonker, CRDate:Jul 2011The differences in scotopic recovery time between LED illuminators and a tungsten-halogen illuminator was investigated. The spectral distribution and the luminous intensity distribution of all the supplied illuminators were measured. The ...Read more