Author:Webb, L; Mathekga, Mmamolatelo EDate:Dec 2014Biometrics, particularly fingerprints, are becoming widely used in the information security field due to the fact that they cannot be lost or stolen as easily as a password or Personal Identification Number (PIN). A challenge with the use of ...Read more
Author:Schietekat, Sunelle; De Waal, Alta; Gopaul, Kevin GDate:Sep 2016This paper provides a methodology for Validation and Verification (V&V) of a Bayesian Network (BN) model for aircraft vulnerability against Infrared (IR) missile threats. The model considers that the aircraft vulnerability depends both on a ...Read more