ResearchSpace
Search
Login
All of ResearchSpace
Research Outputs
CSIR Publications
Archives Collection
Datasets
Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
ResearchSpace
→
Search
Search
Search:
All of ResearchSpace
Archives collection
CSIR Publications
Datasets
Research Publications/Outputs
Filters
Use filters to refine the search results.
Current Filters:
Title
Author
Subject
xmlui.ArtifactBrowser.SimpleSearch.filter.Publication_Type
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Title
Author
Subject
xmlui.ArtifactBrowser.SimpleSearch.filter.Publication_Type
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
New Filters:
Title
Author
Subject
xmlui.ArtifactBrowser.SimpleSearch.filter.Publication_Type
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Showing 10 out of a total of 31 results.
(0.014 seconds)
Now showing items 11-20 of 31
Previous Page
1
2
3
4
Next Page
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Governance of cybersecurity in South Africa
Jansen van Vuuren, JC
;
Phahlamohlaka, Letlibe J
;
Leenen, L
(
Academic Conferences Limited
,
2012-07
)
Proposed model for a cybersecurity centre of innovation for South Africa
Jansen van Vuuren, J
;
Grobler, M
;
Leenen, L
;
Phahlamohlaka, Letlibe J
(
Springer
,
2014-07
)
A computer network attack taxonomy and ontology
Van Heerden, Renier P
;
Irwin, B
;
Burke, Ivan D
;
Leenen, L
(
IGI Global Publishing
,
2012
)
A constraint programming solution for the military unit path finding problem
Leenen, L
;
Terlunen, A
;
Le Roux, H
(
Taylor & Francis Group
,
2012
)
A focussed dynamic path finding algorithm with constraints
Leenen, L
;
Terlunen, A
(
IEEE Xplore
,
2013-11
)
Automated classification of computer network attacks
Van Heerden, Renier P
;
Leenen, L
;
Irwin, B
(
IEEE Xplore
,
2013-11
)
Proceedings of the 4th Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2012 (IWSP 2012), Protea Hotel Balalaika, Sandton, 16 August 2012
Van Niekerk, B
;
Leenen, L
;
Ramluckan, T
;
Maharaj, M
(
Defence, Peace, Safety and Security Council for Scientific and Industrial Research also School of Management, IT, and Governance, University of KwaZulu-Natal
,
2012-07
)
Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa
Jansen van Vuuren, JC
;
Leenen, L
;
Zaaiman, JJ
(
2014-03
)
Cyber armies: the unseen military in the grid
Aschmann, M
;
Jansen van Vuuren, J
;
Leenen, L
(
2015-03
)
Towards an ontological model defining the social engineering domain
Mouton, F
;
Leenen, L
;
Malan, MM
;
Venter, HS
(
Springer Berlin Heidelberg
,
2014-08
)
Now showing items 11-20 of 31
Previous Page
1
2
3
4
Next Page
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
masked
Browse
All of ResearchSpace
Communities & Collections
By Issue Date
Authors
Titles
Subjects
Publication Type
Cluster
Impact Area
Discover
Author
Leenen, L (31)
Meyer, T (5)
Van Heerden, Renier P (5)
Chan, Ka Fai P (4)
Jansen van Vuuren, JC (4)
Phahlamohlaka, Letlibe J (4)
Botha, Johannes G (3)
Ghose, A (3)
Irwin, B (3)
Dawood, Zubeida C (2)
... View More
Subject
Cyber warfare (5)
Ontologies (5)
Cybersecurity (4)
Information warfare (4)
Command and control (3)
Cyber defence (3)
Automated systems (2)
Bidirectional Communication (2)
Blockchain (2)
Computer network attacks (2)
... View More
Date Issued
2020 - 2023 (5)
2010 - 2019 (22)
2007 - 2009 (4)
Publication Type
Conference Presentation (23)
Article (5)
Book Chapter (2)
Book (1)
Back to top