dc.contributor.author |
Veerasamy, Namosha
|
|
dc.contributor.author |
Eloff, JHP
|
|
dc.date.accessioned |
2012-02-17T09:12:49Z |
|
dc.date.available |
2012-02-17T09:12:49Z |
|
dc.date.issued |
2011-08 |
|
dc.identifier.citation |
Veerasamy, N and Eloff, JHP. 2011. UML modelling of network warfare examples. The Annual Information Security for South Africa Conference (ISSA 2011), Hayatt Regency Hotel, Rosebank, South Africa, 15-17 August 2011, 6pp |
en_US |
dc.identifier.isbn |
ISBN 978-1-4577-1482-5 |
|
dc.identifier.uri |
http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Veerasamy.pdf
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/5581
|
|
dc.description |
© 2011 EEE. Reprinted, with permission, from Veerasamy, N and Eloff, JHP. 2011. UML modelling of network warfare examples. The Annual Information Security for South Africa Conference (ISSA 2011), Hayatt Regency Hotel, Rosebank, South Africa, 15-17 August 2011. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of CSIR Information Services' products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it. |
en_US |
dc.description.abstract |
The aim of this paper is to clarify the concept of Network Warfare by looking at a typical example that illustrates both the exploitation and protection of information using various aspects of Information and Communication Technology (ICT). By using Unified Modelling Language (UML), the various role players, types of activities and sequences of actions can be represented in an illustrative format. This approach aims to elucidate Network Warfare in a more practical manner. The paper thus deals with four main issues that provide a motivation for modelling, an introduction to the models, the use case collaboration diagram and the sequence diagram of a typical example. The overall goal is to clarify the theoretical field of Network Warfare in a more practical manner. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IEEE |
en_US |
dc.relation.ispartofseries |
Workflow;7153 |
|
dc.subject |
Network warfare |
en_US |
dc.subject |
Unified Modelling Language (UML) |
en_US |
dc.subject |
Information security |
en_US |
dc.title |
UML modelling of network warfare examples |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Veerasamy, N., & Eloff, J. (2011). UML modelling of network warfare examples. IEEE. http://hdl.handle.net/10204/5581 |
en_ZA |
dc.identifier.chicagocitation |
Veerasamy, Namosha, and JHP Eloff. "UML modelling of network warfare examples." (2011): http://hdl.handle.net/10204/5581 |
en_ZA |
dc.identifier.vancouvercitation |
Veerasamy N, Eloff J, UML modelling of network warfare examples; IEEE; 2011. http://hdl.handle.net/10204/5581 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Veerasamy, Namosha
AU - Eloff, JHP
AB - The aim of this paper is to clarify the concept of Network Warfare by looking at a typical example that illustrates both the exploitation and protection of information using various aspects of Information and Communication Technology (ICT). By using Unified Modelling Language (UML), the various role players, types of activities and sequences of actions can be represented in an illustrative format. This approach aims to elucidate Network Warfare in a more practical manner. The paper thus deals with four main issues that provide a motivation for modelling, an introduction to the models, the use case collaboration diagram and the sequence diagram of a typical example. The overall goal is to clarify the theoretical field of Network Warfare in a more practical manner.
DA - 2011-08
DB - ResearchSpace
DP - CSIR
KW - Network warfare
KW - Unified Modelling Language (UML)
KW - Information security
LK - https://researchspace.csir.co.za
PY - 2011
SM - ISBN 978-1-4577-1482-5
T1 - UML modelling of network warfare examples
TI - UML modelling of network warfare examples
UR - http://hdl.handle.net/10204/5581
ER -
|
en_ZA |