GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Modelling and digital science

 

News

CSIR Research Space is constantly being developed and populated. Please report any errors to Siphethile Muswelanto Constructive criticism and suggestions would be welcome.

Collections in this community

Recent Submissions

  • Mtsweni, Jabu (CSIR, 2017-10)
    This presentation discusses how research and development can be used in an Industry 4.0 environment to enhance cybersecurity.
  • Williams, Quentin R (CSIR, 2017-10)
    This presentation briefly discusses problems/trends such as unemployment, lack of advanced skills, import-driven economy, and the nature of the South African ICT sector. Digital innovation is put forward as a disruptor of ...
  • Taute, Barend JE (CSIR, 2017-10)
    This presentation discusses the work that has been done by the CSIR in order to improve cybersecurity in the South African industry. The CSIR's cybersecurity track record, RDI focus areas, key R&D partnerships as well as ...
  • Pennefather, S; Bradshaw, K; Irwin, Barry VW (SATNAC, 2017-09)
    Currently, network analytics requires direct access to network packets, normally through a third-party application, which means that obtaining realtime results is difficult. We propose the NFP-CPU heterogeneous framework ...
  • Lakha, D (CSIR, 2017-10)
    This presentation discusses why insider threats are considered one of the main threats to cybersecurity.
  • Strauss, P (CSIR, 2017-10)
    This presentation discusses cybercrimes in the banking sector, and how these crimes are profoundly different to traditional crime.
  • Burke, Ivan D; van Heerden, Renier P (IGI Global, 2017-10)
    Data breaches are becoming more common and numerous every day, where huge amount of data (corporate and personal) are leaked more frequently than ever. Corporate responses to data breaches are insufficient, when commonly ...
  • Kunene, D; Vadapalli, H; Cronje, J (ACM Digital Library, 2016-09)
    Blind people face difficulties when navigating unfamiliar environments. The information displayed on indoor signs and notice boards is of no use to them. In order to assist them with this challenge, we propose a real time ...
  • Adeleke, Oluwatoyin A; Karry, KM; Michniak-Kohn, BB; Monama, Nkwe O (2015-10)
    The purpose of this abstract is to design and characterize a thermodynamically stable mouth-dissolving film containing isoniazid employing in silico and in vitro techniques. Isoniazid (solubility = 140 mg/mL and log P = ...
  • Burke, Michael (ACM Digital Library, 2017-10)
    Machine learning models trained using images can be used to generate image overlays by investigating which image areas contribute the most towards model outputs. A common approach used to accomplish this relies on blanking ...
  • Jamison, Kevin A; Rossouw, Pieter S; Miles, Elizna (2017-09)
    When a new store is integrated with an aircraft, it is necessary to verify that it separates safely for all possible release and emergency jettison scenarios. A large number of store separation analyses are required to ...
  • Chindipha, SD; Irwin, Barry VW (SATNAC, 2017-09)
    The SQL Slammer worm is a self propagated computer virus that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic. An observation of network traffic captured in the Rhodes ...
  • Sweeney, M; Irwin, Barry VW (2017-09)
    As networks have grown, so has the data available for monitoring and security purposes. This increase in volume has raised significant challenges for administrators in terms of how to identify threats in amongst the large ...
  • Motara, YM; Irwin, Barry VW (2017-09)
    Finding a preimage for a SHA-1 hash is, at present, a computationally intractable problem. SAT-solvers have been useful tools for handling such problems and can often, through heuristics, generate acceptable solutions. ...
  • Pearson, D; Irwin, Barry VW; Herbert, A (2017-09)
    Malicious entities are constantly trying their luck at exploiting known vulnerabilities in web services, in an attempt to gain access to resources unauthorized access to resources. For this reason security specialists ...
  • Dlamini, Thandokuhle M; Eloff, JHP; Venter, HS; Eloff, MM; Henha Eyono, RPS; Mosola, NN (2017-09)
    This paper investigates how to effectively stop an attacker from using compromised user credentials to gain authorized entry to systems that they are otherwise not authorised to access. The proposed solution extends previous ...
  • Brown, Dane; Bradshaw, K (2017-09)
    In the new Digital Economy, mobile devices are increasingly 978-0-620-76756-9being used for tasks that involve sensitive and/or financial data. Hitherto, security on smartphones has not been a priority and furthermore, ...
  • Kingsley Bell, L; Mouton, Francois; Meyer, T (IEEE, 2017-03)
    The rapid development of smart-phone technology in recent years has lead to many smart-phone owners owning out-of-date devices, equipped with useful technologies, which are no longer in use. These devices are valuable ...
  • Gerber, MC; Gerber, AJ; Van der Merwe, A (Association of Information Systems (AIS), 2015-08)
    The Conceptual Framework for Financial Reporting (CFfFR) was developed to provide guidance to users and preparers of financial reports and standards. However, general consensus within the accounting community is that the ...
  • Gerber, MC; Gerber, AJ; Van der Merwe, A (Association of Information Systems (AIS), 2015-08)
    The Conceptual Framework for Financial Reporting (CFfFR) was developed to provide guidance to users and preparers of financial reports and standards. However, general consensus within the accounting community is that the ...

View more