GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Command control and information warfare

 

This collection has been changed from 'systems modelling' to 'command control and information warfare'. Please note that these changes will not interfere with your subscription

News

CSIR Research Space is constantly being developed and populated. Please report any errors to Siphethile Muswelanto. Constructive criticism and suggestions would be welcome.

Recent Submissions

  • Asiru, OF; Dlamini, Moses T; Blackledge, M (2017-06)
    Computer viruses have become complex and operates in a stealth mode to avoid detection. New viruses are argued to be created each and every day. However, most of these supposedly ‘new’ viruses are not completely new. Most ...
  • Swart, I; Irwin, B; Grobler, M (Academic Bookshop, UK, 2015-03)
    A proliferation of cyber security strategies have recently been published around the world with as many as thirty five strategies documented since 2009. These published strategies indicate the growing need to obtain a clear ...
  • Thaba, Mphahlela (2017-05)
    The evolution of military warfare and its increasing complexity has made planning for future military deployments more difficult. The need to plan for more uncertain military operating environments makes it more complex. ...
  • Mtsweni, Jabu; Shozi, Nobubele A; Matenche, Kqwadi; Mutemwa, Muyowa; Mkhonto, Njabulo; Jansen van Vuuren, Joey (2016-03)
    Big Data is transforming the global technological landscape by elevating online information access required for addressing everyday challenges, such as detecting in real-time the spread of diseases within areas of interest. ...
  • Mtshweni, Jabu; Mutemwa, Muyowa; Mkhonto, Njabulo (2016)
    As data in cyberspace continues to grow because of the ubiquity of Information Communication Technologies (ICT), it is becoming challenging to obtain context-aware, actionable information from Big Data to timely detect and ...
  • Blasch, E; Costa, PCG; De Villiers, J Pieter; Laskey, KB; Llinas, J; Jousselme, A-L (IEEE, 2016-07)
    Over the course of Dave Hall's career, he highlighted various concerns associated with the implementation of data fusion methods. Many of the issues included the role of uncertainty in data fusion, practical implementation ...
  • Phahlamohlaka, Jackie; Kepaletwe, D; Ndala, V; Phahlamohlaka, L (Springer, 2016-08)
    This paper identifies and describes five economic activities through which ICT could effectively be used to open global markets for rural and marginalized communities. The activities are identified in contexts where there ...
  • Oosthuizen, Rudolph; Swart, Ignatius; Pretorius, L (Wiley, 2016-07)
    Systems engineering is still a growing field that depends on continuous research to develop and mature. Research in systems engineering is difficult and the classic approaches for other engineering disciplines may not be ...
  • Moganedi, Sophia; Mkhonto, Njabulo; Mtsweni, Jabu (IEEE, 2016-12)
    Crowdsourcing platforms have changed the assignment and completion of tasks from a known crowd to the anonymous crowd, which is the public. These crowdsourcing platforms allow organizations to focus on other tasks that ...
  • Van der Merwe, LJ; De Villiers, Johan P (Institution of Engineering and Technology (IET), 2016-12)
    In this study a comparative analysis is performed between a novel Viterbi based and multiple hypothesis based track stitching algorithms. The track fragments in the Viterbi based track stitching algorithm are modelled as ...
  • Leenen, L; Meyer, T (IGI Global, 2016-07)
    The Governments, military forces and other organisations responsible for cybersecurity deal with vast amounts of data that has to be understood in order to lead to intelligent decision making. Due to the vast amounts of ...
  • Van Heerden, R; Von Soms, S; Mooi, R (IST Africa, 2016-05)
    This paper introduces a classification scheme for the visual classification of cyber attacks. Through the use of the scheme, the impact of various cyber attacks throughout the history of South Africa are investigated and ...
  • Van Heerden, R; Chan, P; Leenen, L; Theron, J (IGI Global, 2016-09)
    The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning ...
  • Oosthuizen, R; Pretorius, L (South African Institute of Industrial Engineering (SAIIE), 2016-08)
    In complex sociotechnical systems, cognitive and social humans use technology to make sense of situations for decisions. These elements make sociotechnical systems difficult to develop. A modelling and assessment methodology ...
  • Oosthuizen, R; Venter, C (The International Command and Control Institute, 2016-09)
    Systems engineering is an established approach to develop systems, including complex sociotechnical systems such as Command and Control (C2) Systems. These systems often occur through introduction of a new technology into ...
  • Burmeister, O; Phahlamohlaka, J; Al-Saggaf, Y (IGI Global, 2015)
    Good governance from an ethical perspective in cyberdefence policy has been seen in terms of duty and consequentialism. Yet the negotiated view of virtue ethics can also address how nation states mitigate the risks of a ...
  • Van Vuuren, JJ; Plint, G; Leenen, L; Zaaiman, J; Kadyamatimba, A; Phahlahmohlaka, J (2016)
    With the advancement of technology and proliferation of mobile and computing devices through all levels of society, cyber power is becoming an increasingly prominent driver in the attainment of national security for any ...
  • Dlamini, ZI; Olivier, MS; Grobler, MM (Academic Conferences International Limited, 2016-03)
    According to the 2013 report by the ITU, the total mobile cellular subscriptions are expected to reach close to the landmark figure of 7 billion by the end of 2014, more than half of which are found in the developing ...
  • Oosthuizen, R; Pretorius, L (American Society for Engineering Management, 2015-10)
    Introducing a new technology into a complex sociotechnical system will have planned as well as unplanned impact. Dynamic interaction between the technology, people, and environment may result in counter intuitive systemic ...
  • Lubbe, Estelle; Withey, Daniel J; Uren, KR (IEEE, 2015-09)
    This paper introduces a state estimation methodology for a hexapod robot that makes use of proprioceptive sensors and a kinematic model of the robot. The methodology focuses on providing reliable full pose state estimation ...

View more