GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Information security

 

Recent Submissions

  • Gangire, Y; Da Veiga, A; Herselman, Martha E (IEEE, 2019-03)
    The increase in threats to information systems resources in organisations has been attributed to the failure by employees to adhere to information security policies. Research into the information security behaviour of ...
  • Nair, Kishor K; Abu-Mahfouz, Adnan MI; Lefophane, Samuel (IEEE, 2019-03)
    Internet of Things (IoT) has the potential to enable the interconnection of small foot-print devices, which can offer valuable information for various critical use cases. It is expected to enable interconnections of ...
  • Nair, Kishor Krishan; Helberg, Albert; Van der Merwe, Johannes J (2017-04)
    Magnetic stripe card technology has been deployed for more than six decades worldwide and is extensively used in banking. Data embedded in them are often relied upon as a benchmark for user authentication. As such reliance ...
  • Dawood, ZC (Academic Conferences and Publishing (ACPI)., 2019-02)
    Behavioural biometrics are increasingly being used to authenticate users for various applications. As active research is being conducted for behavioural biometrics, researchers face difficulty in sharing and annotating ...
  • Khan, Zubeida C (Academic Conferences and Publishing (ACPI)., 2019-03)
    Computer Security Incident Response Teams (CSIRTs) are responsible for data collection and analysis concerning cyber security threat incidents. In order to provide the best service support for cyber security breaches, ...
  • Mashiane, Charmaine T; Dlamini, Innocentia Z; Mahlangu, Thabo (Academic Conferences and Publishing (ACPI), 2019-02)
    It is important that government, private sectors and the citizens are cybersecurity savvy. This is often a challenge as the size of the target group is large and the expertise is diverse. This is coupled with limited ...
  • Vorster, J; Irwin, B; Van Heerden, Renier P (Academic Conferences and Publishing International, 2018-03)
    During the past decade, the sophistication and maturity of Enterprise-level Information Security (EIS) Standards and Systems has increased significantly. This maturity, particularly in the handling of enterprise-wide ...
  • Nwanebu, Docas (Academic Conferences and Publishing International, 2019-03)
    Securing information is a paramount feature in the world of internet where there is consistence enormous flow of information. With everyone having access to the same internet, sensitive information needs concealment from ...
  • Shozi, Nobubele A; Mtsweni, Jabu (IEEE, 2017-06)
    Social media sites have provided us with the ability to share information about our daily activities. However, users do not understand the implications of sharing their personal data on social media sites. Individuals on ...
  • Mashiane, T; Pillay, N (2014-11)
    Password cracking is the term commonly used to describe the illegal action of gaining access to clear text versions of user passwords. Hackers are notorious for stealing encrypted passwords and cracking them. The same ...
  • Lorgat, MW; Baghai-Wadji, A; McDonald, Andre M (IEEE, 2017-10)
    The performance loss due to incomplete information in denial of service (DoS) detection is quantified in this paper. Volumetric DoS detection is formulated as a signal detection problem. Two detectors are defined: the first ...
  • Joshua, AO; Nelwamondo, Fulufhelo V; Mabuza-Hocquet, Gugulethu P (IEEE, 2019-01)
    Glaucoma has been attributed to be the leading cause of blindness in the world second only to diabetic retinopathy. About 66.8 million people in the world have glaucoma and about 6.7 million are suffering from blindness ...
  • Mahlangu, Thabo V; January, Sinethemba; Mashiane, Charmaine T; Dlamini, Thandokuhle M; Ngobeni, Sipho J; Ruxwana, Lennox N (2019-02)
    In the cyberspace, system defenders might have an idea of their own cybersecurity defense systems, but they surely have a partial view of the cyberspace battlefield and almost zero knowledge of the attackers. Evidently, ...
  • Leenen, Louise; Meyer, T (IGI Global, 2018-01)
    The Governments, military forces and other organisations responsible for cybersecurity deal with vast amounts of data that has to be understood in order to lead to intelligent decision making. Due to the vast amounts of ...
  • Berglund, Martin; Drewes, F; Van der Merwe, B (2018-08)
    Modern regular expression matching software features many extensions, some general while some are very narrowly specified. Here we consider the generalization of adding a class of operators which can be described by, e.g. ...
  • Manuel, M; Isong, B; Esiefarienrhe, M; Abu-Mahfouz, Adnan MI (IEEE, 2018-10)
    Wireless Sensor Networks (WSNs) are network paradigm that are constrained by several challenges such as management of the network, energy consumption, data processing, quality of services (QoS) provisioning, and security. ...
  • Mawonde, K; Isong, B; Lugayizi, F; Abu-Mahfouz, Adnan MI (IEEE, 2018-10)
    Vehicle security is an emergent issue in the technology sector that has benefited from the continuous advancement in technology through the creation of more complex and advanced security systems. This serves to address the ...
  • Mokoena, Nthabiseng ME; Nair, Kishor K (IEEE, 2018-08)
    The choice of a face database should solemnly depend on the problem to be solved. In this research work, we use the Face Recognition Technology (FERET) database to address the challenge of face pose variations. The Scale ...
  • Thupae, R; Isong, B; Gasela, N; Abu-Mahfouz, Adnan MI (IEEE, 2018-01)
    Software defined networking (SDN) is a paradigm developed to cope with inherent limitations posed by the lack of flexibility in the traditional networking architecture like the Wireless Sensor Network (WSN). The application ...
  • Mthethwa, Sthembile N; Dlamini, Nelisiwe; Barbour, Graham (2018-12)
    Even with the ability to produce documents digitally, the paperless environment has yet to become a reality in South Africa. Hardcopy documents are still printed daily which makes them susceptible to document fraud. In ...

View more