GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing Information security by Issue Date

Sort by: Order: Results:

  • Venter, JP; De Waal, A; Willers, N (SpringerLink.com, 2007-01)
    Forensic analysis requires a keen detective mind, but the human mind has neither the ability nor the time to process the millions of bytes on a typical computer hard disk. Digital forensic investigators need powerful tools ...
  • Chifura, A; Nkomo, P; Chadwick, J (2008-09)
    The increase in internet connectivity has created new avenues for smart cards to be used as identity tokens in distributed on-line web-services. To make this possible, one must be able to read the card and communicate with ...
  • Ngobeni, SJ; Venter, HS (2008-09)
    There are currently many different types of wireless crime investigation tools designed for different purposes in order to track down intruders of wireless crime, like Intrusion Detection Systems (IDSs), Wlan-Jack, HotSpotter, ...
  • Miya, WS; Mpanza, LJ; Marwala, T; Nelwamondo, Fulufhelo V (Institute of Electrical and Electronics Engineers (IEEE), 2008-10)
    In this paper, a comparison between Extension Neural Network (ENN), Gaussian Mixture Model (GMM) and Hidden Markov model (HMM) is conducted for bushing condition monitoring. The monitoring process is a two-stage implementation ...
  • Dlamini, MT; Eloff, JHP; Eloff, MM (Elsevier, 2009)
    Information security has evolved from addressing minor and harmless security breaches to managing those with a huge impact on organisations’ economic growth. This paper investigates the evolution of information security; ...
  • Höne, K; Eloff, JHP (Virtus Interpress, 2009)
    World wide the importance of Information Security Governance is demanding the attention of senior management. This is due to the ever-changing threat landscape requiring that organisations adopt a focussed approach towards ...
  • Abu-Mahfouz, Adnan MI; Hancke, GP (2009)
    Elliptic curve cryptosystems like others public key encryption schemes, require computing a square roots modulo a prime number. The arithmetic operations in elliptic curve schemes over Optimal Extension Fields (OEF) can ...
  • Veerasamy, Namosha (4th International Conference on Information Warfare and Security, 2009-03)
    Terrorism has entered a new wave in that the latest battleground to emerge is cyberspace. Cyber-terrorism reflects a current concern in the way terrorists will seek to strike the innocent and wreak havoc. Since explosives ...
  • Martim, E; Dlamini, M; Van Greunen, D; Eloff, J; Herselman, Martha E (2009-03)
    Security and usability are crucial factors for the successful of any e-commerce system. However, they have traditionally been considered a design trade-off. In an effort to align them, this paper highlights the design ...
  • Veerasamy, Namosha (Mindsystems, 2009-04)
    Uneasiness arises from the possibility of random cyber attacks. In the global information and network warfare battle, cyberterrorism has become a critical concern in that terrorists may seek to strike the innocent and wreak ...
  • Veerasamy, Namosha; Taute, B (Information Security South Africa, 2009-04)
    With technological change and advancement, attackers are increasingly becoming more sophisticated in their attack strategies and techniques. Other global factors and developments also impact the line of attack. This paper ...
  • Balikuddembe, JK; Osunmakinde, IO; Bagula, A (Springer, 2009-04)
    Undertaking adequate risk management by understanding project requirements and ensuring that viable estimates are made on software projects require extensive application and sophisticated techniques of analysis and ...
  • Dlamini, I; Olivier, M; Grobler, M (2009-06)
    This paper extends work on a forensic model for traffic isolation based on Differentiated Services (DiffServ) and measures its performance by using a simulation. The simulated model has four basic components: traffic ...
  • Grobler, MM; Von Solms, SH (2009-06)
    This paper discusses the development of a South African model for Live Forensic Acquisition - Liforac. The Liforac model is a comprehensive model that presents a range of aspects related to Live Forensic Acquisition. The ...
  • Taute, B (2009-06-06)
    In his keynote address on the DST-funded Information Security Centre of Competence, the speaker concentrates on four important issues. These refer to threats and vulnerabilities in Cyberspace (that encompasses all forms ...
  • Dlamini, MT; Eloff, MM; Eloff, JHP; Hone, K (2009-07)
    The entire business landscape finds itself on the verge of a recession because of ongoing global economic turmoil. Thus, there is a heightened need to minimise and mitigate business risk and scrutinise information spending ...
  • Grobler, MM; Von Solms, SH (2009-07)
    The development of the Live Forensic discipline instigates the development of a method that allows forensically sound acquisition to stand fast in a court of law. The study presents the development of a comprehensive model ...
  • Ngobeni, SJ; Grobler, MM (2009-07)
    Recent technology advancement has resulted in an era where many organisations become more and more comfortable to use computer systems to process their information. Intruders are making it their mission to break into these ...
  • Dlamini, I; Olivier, M (2009-07)
    Currently, network evidence used in a court of law can be lacking and inadequate for prosecution purposes, due to a loss of packets during the network transmission. This packet loss in turn may be caused by the congestion ...
  • Ngobeni, SJ; Venter, HS (2009-07)
    The proliferation of wireless mobile communication technology has emerged and this has resulted in the increase of the wireless users. On the other hand, cyber crime in WLANs has appeared to be gradually increasing world ...

Search ResearchSpace


Advanced Search

Browse

My Account