Author:Grant, T; Burke, Ivan D; Van Heerden, Renier PDate:Oct 2015Based on the idea that offensive cyber operations should be studied and merge from the darkness in which they typically hide, Grant and his colleagues embarked on a research program to explore the potential answers to the question, " What ...Read more
Author:Ngobeni, Sipho J; Venter, H; Burke, Ivan DDate:Jan 2010Over the past decade, wireless mobile communications technology based on IEEE 802.11 wireless local area networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility ...Read more