Author:Van Heerden, Renier P; Leenen, L; Irwin, BDate:Nov 2013In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through ...Read more
Author:Van Niekerk, B; Leenen, L; Ramluckan, T; Maharaj, MDate:Jul 2012The Workshop on ICT Uses in Warfare and the Safeguarding of Peace is a note-worthy initiative that follows on three previous workshops: London (2007), Pretoria (2008), and Bela-Bela (2010). After the success of the workshops held in South ...Read more