GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Information security

 

Recent Submissions

  • Jideani, P; Leenen, Louise; Alexander, B; Barnes, J (2018-08)
    Cybersecurity is one of the five key technologies that will spell the difference between company success and failure. This study seeks to understand cybersecurity environment of e-retail in South Africa. The focus is ...
  • Ngejane, Hombakazi; Eloff, J; Mabuza-Hocquet, Gugulethu P; Lefophane, Samuel (2018-08)
    Cyber threats such as identity deception, cyber bullying, identity theft and online sexual grooming have been witnessed on social media. These threats are disturbing to the society at large. Even more so to minors who are ...
  • Moganedi, Mapoung S (Academic Conferences and Publishing International, 2018-06)
    The introduction of Internet of Things (IoT has revolutionized the healthcare sector through the digitalization with an enormous amount of patient data that is collected, processed, stored and shared amongst different ...
  • Dlamini, Nelisiwe P; Mthetwa, Sthembile N; Barbour, Graham D (2018-08)
    The issue of hardcopy document forgery is still prevalent. In South Africa, a series of cases have been reported where academic documents are forged. This poses a problem of integrity, trust and authentication of hardcopy ...
  • Gcaza, Noluxolo (Lulu Press, 2018-08)
    Information and communication technologies (ICTs) are responsible for the transformation of societies, nations and the world at large. ICTs are considered to improve the quality of life for citizens as they bring about ...
  • Ntshangase, Cynthia S; Shabalala, Meshack B (Encryption using finger-code generated from fingerprints, 2018-03)
    In this paper, the literature survey of different algorithms for generating encryption keys using fingerprints is presented. The focus is on fingerprint features called minutiae points where fingerprint ridges end or ...
  • Naidoo, A; Tapamo, JR; Khutlang, Rethabile (Springer, 2018-07)
    Facial expression contains a rich variety of affective information. Facial Expression Recognition (FER) is an emerging field that has broad applications in the fields of human-computer interaction, psychological behaviour ...
  • Veerasamy, Namosha; Labuschagne, William A (IGI, 2018-04)
    This article describes how social media has revolutionised the way in which people communicate, interact and engage. This phenomenon has transformed the digital world with its ease, convenience and numerous capabilities ...
  • Jansen van Vuuren, Joey; Leenen, Louise (Academic Conferences and Publishing International Ltd, 2018-03)
    Cyber Defence is a core driver in the attainment of national security for any country. Perceived Cyberpower can be determined by the analysis of the elements of cyberspace as part of national security. In this paper the ...
  • Leenen, Louise; Aschman, MJ; Grobler, MM; Van Heerden, Adelai (Academic Conferences and Publishing International Ltd, 2018-03)
    Cyber as an operational domain is widely recognised by military forces, but the process to operationalise cyber poses a number of challenges. One of the difficulties is that traditional military culture is far removed from ...
  • Van Heerden, Renier; Von Solms, S; Vorster, J (IIMC International Information Management Corporation, 2018-05)
    The integration of technology in the modern society provides many benefits, but with increased connectivity comes increased risk where governments, businesses and individuals are vulnerable to a variety of cyber-attacks. ...
  • Mthethwa, Sthembile; Dlamini, Nelisiwe P (2018-03)
    Hardcopy document forgery is still a challenge and occurs frequently nowadays. Many countries have reported a lot of cases, including South Africa where government issues documents are forged. Protecting these documents ...
  • Ntlangu, Mbulelo Brenwen; Baghai-Wadji, A (Association for Computing Machinery (ACM), 2017-12)
    With the advent of Internet of Things (IoT) technology, the need for tools which facilitate the development and management of network based services has become increasingly important. Issues such as network security and ...
  • Ledwaba, Lehlogonolo PI; Hancke, GP; Venter, HS; Isaac, Sherrin J (IEEE, 2017-11)
    In past years, cryptography has been considered a difficult task to achieve on sensor nodes for the Internet of Energy (IoE) owing to the resource-constrained nature of 8-bit and 16-bit microcontroller units (MCUs). Previous ...
  • Mkuzangwe, Nenekazi NP; Nelwamondo, Fulufhelo V (IEEE, 2017-11)
    This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can ...
  • Kgogo, T; Isong, B; Abu-Mahfouz, Adnan MI (IEEE, 2017-09)
    Wireless Sensors Networks (WSNs) have been gaining significant attention in both the industries and the academia in recent years. However, WSN are vulnerable to growing security threats and attacks which are inept for the ...
  • Pritchard, SW; Hancke, GP; Abu-Mahfouz, Adnan MI (IEEE, 2017-07)
    A Software-Defined Wireless Sensor Network (SD-WSN) is a recently developed model which is expected to play a large role not only in the development of the Internet of Things (IoT) paradigm but also as a platform for other ...
  • Labuschagne, William A; Veerasamy, Namosha (Academic Conferences and Publishing, 2017-06)
    Technology has integrated with society resulting in the dependence of its availability to conduct daily activities. In the corporate domain the availability of information is critical to decision making as it affects the ...
  • Labuschagne, William A; Grobler, Marthie M (Academic Conferences and Publishing, 2017-06)
    With the increase in technology adoption, quality assurance in terms of the technical skill level of cybersecurity experts working on a task is crucial. Educating employees and ensuring that they have the necessary tools ...
  • Weiss, M; Botha, Adèle; Herselman, Martha E; Loots, G (2017-05)
    Blockchain technology underpins a radical rethink of information privacy, confidentiality, security and integrity. As a decentralised ledger of transactions across a peer-to-peer network, the need for a central third party ...

View more