GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Information security

 

News

CSIR Research Space is constantly being developed and populated. Please report any errors to Siphethile Muswelanto Constructive criticism and suggestions would be welcome.

Recent Submissions

  • Chan, Ke Fai Peter; De Souza, Pedro (2017-03)
    This research paper investigates a technique to transform network simulation data into linked data through the use of ontology models. By transforming the data, it allows one to use semantic reasoners to infer and reason ...
  • Vorster, JS; Van Heerden, Renier P (Peregrine Technical Solutions, 2015-10)
    Depending on the graphical password schema, the key-space can be even bigger than alpha-numeric passwords. However, in conventional passwords, users will re-use letters within a password. This study investigates graphical ...
  • Khutlang, Rethabile; Machaka, Pheeha; Singh, Ann; Nelwamondo, Fulufhelo V (Intech, 2017-08)
    Biometric fingerprint scanners scan the external skin's features onto a 2-D image. The performance of the automatic fingerprint identification system suffers first and foremost if the finger skin is wet, worn out or a fake ...
  • Asiru, OF; Dlamini, Moses T; Blackledge, M (2017-06)
    Computer viruses have become complex and operates in a stealth mode to avoid detection. New viruses are argued to be created each and every day. However, most of these supposedly ‘new’ viruses are not completely new. Most ...
  • Mvelase, PS; Dlamini, ZZ; Dludla, A; Sithole, HM (International Information Management Corporation (IIMC), 2015-11)
    The acceptance of cloud computing is increasing in a fast pace in distributed computing environment. The use of cloud environments for storage and data processing needs is on the rise. On the other hand, mobile devices ...
  • Mabuza-Hocquet, Gugulethu P; Nelwamondo, Fulufhelo V; Marwala, T (Springer, 2017-02)
    Research in iris biometrics has been focused on utilizing iris features as a means of identity verification and authentication. However, not enough research work has been done to explore iris textures to determine soft ...
  • Swart, I; Irwin, B; Grobler, M (Academic Bookshop, UK, 2015-03)
    A proliferation of cyber security strategies have recently been published around the world with as many as thirty five strategies documented since 2009. These published strategies indicate the growing need to obtain a clear ...
  • Botes, FH; Leenen, Louise; De La Harpe, R (Academic Publishing, 2017-06)
    In the ashes of Moore’s Law, companies have to acclimatise to the vast increase of data flowing through their networks. Reports on information breaches and hackers claiming ransom for company data are rampant. We live in ...
  • Veerasamy, Namosha (2017-06)
    Managing the rise of cyber-attacks has become a growing challenge. Cyber space has become a battleground of threats ranging from malware to phishing, spam and password theft. Cybersecurity solutions mainly try to take a ...
  • Botha, Johannes G; Grobler, MM; Eloff, MM (2017-06)
    Data breaches have gained extensive coverage as businesses and organisations of all sizes become more dependent on digital data, cloud computing and workforce mobility. Companies store sensitive or confidential data on ...
  • Mabuza-Hocquet, Gugulethu; Nelwamondo, Fulufhelo; Marwala, T (IEEE, 2017-03)
    The prediction and classification of ethnicity based on iris texture patterns using image processing, artificial intelligence and computer vision techniques is still a recent topic in iris biometrics. While the large body ...
  • Jacobs, Pierre C; Von Solms, SH; Grobler, Marthie M (2017-06)
    Nations need to develop cybersecurity capabilities at national level in order to facilitate the requirements expressed through national authoritative and normative documents. These national cybersecurity capabilities ...
  • Peach, Schalk; Irwin, B; Van Heerden, Renier (2016-07)
    The objective of this paper is to assess the current state of Container-Based Emulator implementations on the Linux platform. Through a narrative overview, a selection of open source Container-Based emulators are analysed ...
  • Vorster, JS; Van Heerden, Renier P; Irwin, B (IEEE, 2016-08)
    Conventional (text-based) passwords have shown patterns such as variations on the username, or known passwords such as ”password”, ”admin” or ”12345”. Patterns may similarly be detected in the use of Graphical passwords ...
  • Mtsweni, Jabu; Shozi, Nobubele A; Matenche, Kqwadi; Mutemwa, Muyowa; Mkhonto, Njabulo; Jansen van Vuuren, Joey (2016-03)
    Big Data is transforming the global technological landscape by elevating online information access required for addressing everyday challenges, such as detecting in real-time the spread of diseases within areas of interest. ...
  • Shozi, Nobubele A; Mtshweni, Jabu (Academic Conferences and Publishing Limited, 2016-03)
    Big data is a term that describes data of huge volumes, variable speeds, and different structures. Even though the rise of big data can yield positives, the nature of big data poses challenges as capturing, processing and ...
  • Darlow, Luke N; Connan, J; Singh, Ann (SPIE, 2016-06)
    The Hybrid fingerprint is a local-quality-specific blend of the surface and internal fingerprints, extracted from optical coherence tomography scans. Owing to its origin, and the manner in which it is obtained, the Hybrid ...
  • Machaka, Pheeha; McDonald, Andre M; Nelwamondo, Fulufhelo V; Bagula, A (Springer, 2015-11)
    The paper presents the threats that are present in Internet of Things (IoT) systems and how they can be used to perpetuate a large scale DDoS attack. The paper investigates how the Cumulative Sum (CUSUM) algorithm can be ...
  • Mtshweni, Jabu; Mutemwa, Muyowa; Mkhonto, Njabulo (2016)
    As data in cyberspace continues to grow because of the ubiquity of Information Communication Technologies (ICT), it is becoming challenging to obtain context-aware, actionable information from Big Data to timely detect and ...
  • Salami, O; Mtsweni, Jabu (IEEE, 2016-05)
    Technological advancements have provided Banks several means of sending messages to their customers. In the context of business-to-customer interaction, Single Channel Messaging (SCM) model is prominently used by most Banks ...

View more