Author:Boloka, Tlou J; Crafford, Gerhardus J; Mokuwe, Mamuku W; Van Eden, BeatriceDate:Jan 2021Most developing countries suffer from inadequate health care facilities and a lack of medical practitioners as most of them emigrate to developed countries. The outbreak of the COVID-19 pandemic has left these countries more vulnerable to ...Read more
Author:Ramotsoela, DT; Hancke, GP; Abu-Mahfouz, Adnan MIDate:Apr 2019The threat to critical water system infrastructure has increased in recent years as is evident from the increasing number of reported attacks against these systems. Preventative security mechanisms are often not enough to keep attackers out ...Read more
Author:Ramotsoela, TD; Hancke, GP; Abu-Mahfouz, Adnan MIDate:Oct 2020There has been an increasing number of attacks against critical water system infrastructure in recent years. This is largely due to the fact that these systems are heavily dependent on computer networks meaning that an attacker can use ...Read more
Author:Naidoo, T; Tapamo, JR; McDonald, Andre MDate:Sep 2015A feature selection algorithm that is novel in the context of anomaly–based network intrusion detection is proposed in this paper. The distinguishing factor of the proposed feature selection algorithm is its complete lack of dependency on ...Read more
Author:Naidoo, Tyrone; McDonald, Andre M; Tapamo, J-RDate:Sep 2015A feature selection algorithm that is novel in the context of anomaly–based network intrusion detection is proposed in this paper. The distinguishing factor of the proposed feature selection algorithm is its complete lack of dependency on ...Read more
Author:Mboweni, IV; Abu-Mahfouz, Adnan MI; Ramotsoela, DTDate:Oct 2021The confidentiality, integrity and availability of critical infrastructure is crucial for any economy to operate efficiently. Water distribution critical infrastructure is a target of many attackers who aim to penetrate the system for malicious ...Read more
Author:Lorgat, MW; Baghai-Wadji, A; McDonald, Andre MDate:Oct 2017The performance loss due to incomplete information in denial of service (DoS) detection is quantified in this paper. Volumetric DoS detection is formulated as a signal detection problem. Two detectors are defined: the first operates without ...Read more
Author:Machaka, Pheeha; McDonald, Andre M; Nelwamondo, Fulufhelo V; Bagula, ADate:Nov 2015The paper presents the threats that are present in Internet of Things (IoT) systems and how they can be used to perpetuate a large scale DDoS attack. The paper investigates how the Cumulative Sum (CUSUM) algorithm can be used to detect a DDoS ...Read more