Author:Malatji, Tsholofelo M; Du Plessis, WP; Willers, Cornelius JDate:Feb 2019There remains a wide proliferation of second-generation frequency-modulated conical-scan seekers in the hands of irregular forces, while the understanding of what makes a jam signal effective remains unclear. It is generally known that the ...Read more
Author:Veerasamy, Namosha; Grobler, MDate:Oct 2010Cyberterrorism addresses the convergence of the fear-causing world of terrorism with the abstract realm of cyberspace, computers and networks. While cyberterrorism can be executed using various technical security exploits, it inherently stems ...Read more
Author:Moabalobelo, Terrence; Nelwamondo, Fulufhelo V; Tsague, HDDate:Sep 2012Since the inception of side channel attacks, research has gone a long way in proving that embedded devices capable of running cryptographic algorithms are highly susceptible to these attacks. These attacks are non-invasive in which an attacker ...Read more