GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Command control and information warfare

 

This collection has been changed from 'systems modelling' to 'command control and information warfare'. Please note that these changes will not interfere with your subscription

News

CSIR Research Space is constantly being developed and populated. Please report any errors to Siphethile Muswelanto. Constructive criticism and suggestions would be welcome.

Recent Submissions

  • Blasch, E; Costa, PCG; De Villiers, J Pieter; Laskey, KB; Llinas, J; Jousselme, A-L (IEEE, 2016-07)
    Over the course of Dave Hall's career, he highlighted various concerns associated with the implementation of data fusion methods. Many of the issues included the role of uncertainty in data fusion, practical implementation ...
  • Phahlamohlaka, Jackie; Kepaletwe, D; Ndala, V; Phahlamohlaka, L (Springer, 2016-08)
    This paper identifies and describes five economic activities through which ICT could effectively be used to open global markets for rural and marginalized communities. The activities are identified in contexts where there ...
  • Oosthuizen, Rudolph; Swart, Ignatius; Pretorius, L (Wiley, 2016-07)
    Systems engineering is still a growing field that depends on continuous research to develop and mature. Research in systems engineering is difficult and the classic approaches for other engineering disciplines may not be ...
  • Moganedi, Sophia; Mkhonto, Njabulo; Mtsweni, Jabu (IEEE, 2016-12)
    Crowdsourcing platforms have changed the assignment and completion of tasks from a known crowd to the anonymous crowd, which is the public. These crowdsourcing platforms allow organizations to focus on other tasks that ...
  • Van der Merwe, LJ; De Villiers, Johan P (Institution of Engineering and Technology (IET), 2016-12)
    In this study a comparative analysis is performed between a novel Viterbi based and multiple hypothesis based track stitching algorithms. The track fragments in the Viterbi based track stitching algorithm are modelled as ...
  • Leenen, L; Meyer, T (IGI Global, 2016-07)
    The Governments, military forces and other organisations responsible for cybersecurity deal with vast amounts of data that has to be understood in order to lead to intelligent decision making. Due to the vast amounts of ...
  • Van Heerden, R; Von Soms, S; Mooi, R (IST Africa, 2016-05)
    This paper introduces a classification scheme for the visual classification of cyber attacks. Through the use of the scheme, the impact of various cyber attacks throughout the history of South Africa are investigated and ...
  • Van Heerden, R; Chan, P; Leenen, L; Theron, J (IGI Global, 2016-09)
    The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning ...
  • Oosthuizen, R; Pretorius, L (South African Institute of Industrial Engineering (SAIIE), 2016-08)
    In complex sociotechnical systems, cognitive and social humans use technology to make sense of situations for decisions. These elements make sociotechnical systems difficult to develop. A modelling and assessment methodology ...
  • Oosthuizen, R; Venter, C (The International Command and Control Institute, 2016-09)
    Systems engineering is an established approach to develop systems, including complex sociotechnical systems such as Command and Control (C2) Systems. These systems often occur through introduction of a new technology into ...
  • Burmeister, O; Phahlamohlaka, J; Al-Saggaf, Y (IGI Global, 2015)
    Good governance from an ethical perspective in cyberdefence policy has been seen in terms of duty and consequentialism. Yet the negotiated view of virtue ethics can also address how nation states mitigate the risks of a ...
  • Van Vuuren, JJ; Plint, G; Leenen, L; Zaaiman, J; Kadyamatimba, A; Phahlahmohlaka, J (2016)
    With the advancement of technology and proliferation of mobile and computing devices through all levels of society, cyber power is becoming an increasingly prominent driver in the attainment of national security for any ...
  • Dlamini, ZI; Olivier, MS; Grobler, MM (Academic Conferences International Limited, 2016-03)
    According to the 2013 report by the ITU, the total mobile cellular subscriptions are expected to reach close to the landmark figure of 7 billion by the end of 2014, more than half of which are found in the developing ...
  • Oosthuizen, R; Pretorius, L (American Society for Engineering Management, 2015-10)
    Introducing a new technology into a complex sociotechnical system will have planned as well as unplanned impact. Dynamic interaction between the technology, people, and environment may result in counter intuitive systemic ...
  • Lubbe, Estelle; Withey, Daniel J; Uren, KR (IEEE, 2015-09)
    This paper introduces a state estimation methodology for a hexapod robot that makes use of proprioceptive sensors and a kinematic model of the robot. The methodology focuses on providing reliable full pose state estimation ...
  • Oosthuizen, R; Pretorius, L (IEEE, 2015-11)
    One of the requirements for effective Command and Control is good situation awareness. As situation awareness is a complex phenomenon due to social and cognitive interaction factors, its modelling, prediction and calculation ...
  • Erasmus, L; Du Plooy, N; Schnetler, M; Yadavalli, S (INCOSE, 2015-09)
    Cmore is a collaborative tool for information management for defence and peace operations. It enables and supports real-time decision-making and responses during operations. However, it has the potential to expand into ...
  • Oosthuizen, R; Pretorius, L (International Association for Management of Technology (IAMOT), 2015-06)
    Introducing a new technology into a complex sociotechnical system will have planned as well as unplanned impact. The need for a new technology may arise from new technology available for improved performance (technology ...
  • Jacobs, PC; Solms, SH; Grobler, MM (2015-05)
    Information and Communications Technology is often seen as a critical organisational asset. To prevent loss of revenue and money, as well as to protect organisational reputation, this asset must be protected from threats ...
  • Naidoo, K (CSIR, 2015-10)
    This presentation includes some highlights of recent advancements in Aeronautics Systems Research which includes the use of Modern Design of Experiment for Aerodynamic Simulations to reduce the time and cost of large ...

View more