ResearchSpace

UML modelling of network warfare examples

Show simple item record

dc.contributor.author Veerasamy, Namosha
dc.contributor.author Eloff, JHP
dc.date.accessioned 2012-02-17T09:12:49Z
dc.date.available 2012-02-17T09:12:49Z
dc.date.issued 2011-08
dc.identifier.citation Veerasamy, N and Eloff, JHP. 2011. UML modelling of network warfare examples. The Annual Information Security for South Africa Conference (ISSA 2011), Hayatt Regency Hotel, Rosebank, South Africa, 15-17 August 2011, 6pp en_US
dc.identifier.isbn ISBN 978-1-4577-1482-5
dc.identifier.uri http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Veerasamy.pdf
dc.identifier.uri http://hdl.handle.net/10204/5581
dc.description © 2011 EEE. Reprinted, with permission, from Veerasamy, N and Eloff, JHP. 2011. UML modelling of network warfare examples. The Annual Information Security for South Africa Conference (ISSA 2011), Hayatt Regency Hotel, Rosebank, South Africa, 15-17 August 2011. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of CSIR Information Services' products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it. en_US
dc.description.abstract The aim of this paper is to clarify the concept of Network Warfare by looking at a typical example that illustrates both the exploitation and protection of information using various aspects of Information and Communication Technology (ICT). By using Unified Modelling Language (UML), the various role players, types of activities and sequences of actions can be represented in an illustrative format. This approach aims to elucidate Network Warfare in a more practical manner. The paper thus deals with four main issues that provide a motivation for modelling, an introduction to the models, the use case collaboration diagram and the sequence diagram of a typical example. The overall goal is to clarify the theoretical field of Network Warfare in a more practical manner. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.relation.ispartofseries Workflow;7153
dc.subject Network warfare en_US
dc.subject Unified Modelling Language (UML) en_US
dc.subject Information security en_US
dc.title UML modelling of network warfare examples en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Veerasamy, N., & Eloff, J. (2011). UML modelling of network warfare examples. IEEE. http://hdl.handle.net/10204/5581 en_ZA
dc.identifier.chicagocitation Veerasamy, Namosha, and JHP Eloff. "UML modelling of network warfare examples." (2011): http://hdl.handle.net/10204/5581 en_ZA
dc.identifier.vancouvercitation Veerasamy N, Eloff J, UML modelling of network warfare examples; IEEE; 2011. http://hdl.handle.net/10204/5581 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Veerasamy, Namosha AU - Eloff, JHP AB - The aim of this paper is to clarify the concept of Network Warfare by looking at a typical example that illustrates both the exploitation and protection of information using various aspects of Information and Communication Technology (ICT). By using Unified Modelling Language (UML), the various role players, types of activities and sequences of actions can be represented in an illustrative format. This approach aims to elucidate Network Warfare in a more practical manner. The paper thus deals with four main issues that provide a motivation for modelling, an introduction to the models, the use case collaboration diagram and the sequence diagram of a typical example. The overall goal is to clarify the theoretical field of Network Warfare in a more practical manner. DA - 2011-08 DB - ResearchSpace DP - CSIR KW - Network warfare KW - Unified Modelling Language (UML) KW - Information security LK - https://researchspace.csir.co.za PY - 2011 SM - ISBN 978-1-4577-1482-5 T1 - UML modelling of network warfare examples TI - UML modelling of network warfare examples UR - http://hdl.handle.net/10204/5581 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record