DSpace
 

Researchspace >
General science, engineering & technology >
General science, engineering & technology >
General science, engineering & technology >

Please use this identifier to cite or link to this item: http://hdl.handle.net/10204/5581

Title: UML modelling of network warfare examples
Authors: Veerasamy, N
Eloff, JHP
Keywords: Network warfare
Unified Modelling Language (UML)
Information security
Issue Date: Aug-2011
Publisher: IEEE
Citation: Veerasamy, N and Eloff, JHP. 2011. UML modelling of network warfare examples. The Annual Information Security for South Africa Conference (ISSA 2011), Hayatt Regency Hotel, Rosebank, South Africa, 15-17 August 2011, 6pp
Series/Report no.: Workflow;7153
Abstract: The aim of this paper is to clarify the concept of Network Warfare by looking at a typical example that illustrates both the exploitation and protection of information using various aspects of Information and Communication Technology (ICT). By using Unified Modelling Language (UML), the various role players, types of activities and sequences of actions can be represented in an illustrative format. This approach aims to elucidate Network Warfare in a more practical manner. The paper thus deals with four main issues that provide a motivation for modelling, an introduction to the models, the use case collaboration diagram and the sequence diagram of a typical example. The overall goal is to clarify the theoretical field of Network Warfare in a more practical manner.
Description: © 2011 EEE. Reprinted, with permission, from Veerasamy, N and Eloff, JHP. 2011. UML modelling of network warfare examples. The Annual Information Security for South Africa Conference (ISSA 2011), Hayatt Regency Hotel, Rosebank, South Africa, 15-17 August 2011. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of CSIR Information Services' products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
URI: http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Veerasamy.pdf
http://hdl.handle.net/10204/5581
ISBN: ISBN 978-1-4577-1482-5
Appears in Collections:Information security
General science, engineering & technology

Files in This Item:

File Description SizeFormat
Veerasamy1_2011.pdf174.78 kBAdobe PDFView/Open
View Statistics

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

 

Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback