ResearchSpace
Search
Login
All of ResearchSpace
Research Outputs
CSIR Publications
Archives Collection
Datasets
Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
ResearchSpace
→
Search
Search
Search:
All of ResearchSpace
Archives collection
CSIR Publications
Datasets
Research Publications/Outputs
Filters
Use filters to refine the search results.
Current Filters:
Title
Author
Subject
xmlui.ArtifactBrowser.SimpleSearch.filter.Publication_Type
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Title
Author
Subject
xmlui.ArtifactBrowser.SimpleSearch.filter.Publication_Type
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
New Filters:
Title
Author
Subject
xmlui.ArtifactBrowser.SimpleSearch.filter.Publication_Type
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Showing 10 out of a total of 31 results.
(0.017 seconds)
Now showing items 21-30 of 31
Previous Page
1
2
3
4
Next Page
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
The use of semantic technologies in cyber defence
Leenen, L
;
Meyer, T
(
2015-03
)
An ontological knowledge base for cyber network attack planning
Chan, Ka Fai P
;
Theron, J
;
Van Heerden, Renier P
;
Leenen, L
(
2015-03
)
Developing a simulation for border safeguarding
Van Rooyen, S
;
Leenen, L
(
2011-09
)
Social Engineering Attack Detection Model: SEADMv2
Mouton, F
;
Leenen, L
;
Venter, HS
(
IEEE Xplore
,
2015-10
)
Semantic technologies and big data analytics for cyber defence
Leenen, L
;
Meyer, T
(
IGI Global
,
2016-07
)
Using an ontology for network attack planning
Van Heerden, Renier P
;
Chan, Ka Fai P
;
Leenen, L
;
Theron, J
(
IGI Global
,
2016-09
)
Relaxations of semiring constraint satisfaction problems
Leenen, L
;
Meyer, T
;
Ghose, A
(
Elsevier Science B.V
,
2007-03
)
Description of a network attack ontology presented formally
Van Heerden, Renier P
;
Leenen, L
;
Irwin, B
(
Springer
,
2021-06
)
An analysis of crypto scams during the Covid-19 pandemic: 2020-2022
Botha, Johannes G
;
Botha-Badenhorst, Danielle P
;
Leenen, L
(
2023-03
)
Modelling the cybersecurity environment using morphological ontology design engineering
Jansen van Vuuren, JC
;
Leenen, L
;
Grobler, MM
;
Chan, Ka Fai P
;
Dawood, Zubeida C
(
2015-03
)
Now showing items 21-30 of 31
Previous Page
1
2
3
4
Next Page
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
masked
Browse
All of ResearchSpace
Communities & Collections
By Issue Date
Authors
Titles
Subjects
Publication Type
Cluster
Impact Area
Discover
Author
Leenen, L (31)
Meyer, T (5)
Van Heerden, Renier P (5)
Chan, Ka Fai P (4)
Jansen van Vuuren, JC (4)
Phahlamohlaka, Letlibe J (4)
Botha, Johannes G (3)
Ghose, A (3)
Irwin, B (3)
Dawood, Zubeida C (2)
... View More
Subject
Cyber warfare (5)
Ontologies (5)
Cybersecurity (4)
Information warfare (4)
Command and control (3)
Cyber defence (3)
Automated systems (2)
Bidirectional Communication (2)
Blockchain (2)
Computer network attacks (2)
... View More
Date Issued
2020 - 2023 (5)
2010 - 2019 (22)
2007 - 2009 (4)
Publication Type
Conference Presentation (23)
Article (5)
Book Chapter (2)
Book (1)
Back to top