GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing Defence, peace, safety & security by Title

Sort by: Order: Results:

  • Claessens, R; De Waal, A; De Villiers, Pieter; Penders, A; Pavlin, G; Tuyls, K (SCITEPRESS, 2016-04)
    The range of applications that require processing of temporally and spatially distributed sensory data is expanding. Common challenges in domains with these characteristics are sound reasoning about uncertain phenomena and ...
  • Litvin, Igor A; King, Gary R; Strauss, Hencharl J (Springer, 2017-06)
    We propose a novel intra-cavity laser beam shaping technique based on the manipulation of the transverse gain profile in the laser crystal. The method allows controllable reshaping of a laser output beam into a desired ...
  • Dlamini, Thandokuhle M; Eloff, JHP; Venter, HS; Eloff, MM; Henha Eyono, RPS; Mosola, NN (2017-09)
    This paper investigates how to effectively stop an attacker from using compromised user credentials to gain authorized entry to systems that they are otherwise not authorised to access. The proposed solution extends previous ...
  • Mouton, Francois; Teixeira, M; Meyer, T (IEEE, 2017-11)
    As the nature of information stored digitally be- comes more important and confidential, the security of the systems put in place to protect this information needs to be increased. The human element, however, remains a ...
  • Lessing, MM (2008-09)
    A Security Maturity Model (SMM) provides an organisation with a distinct Information Security framework. Organisations that conform to these models are likely to pursue satisfactory Information Security. Additionally, the ...
  • Kunene, Dumisani C; Vadapalli, H (ACM Digital Library, 2017-09)
    Human detection on static images remains a challenging research problem. This work evaluates the significance of using infrared imaging (IIR) over several human detection systems. Larger complexities arise when detecting ...
  • Lessing, M (2008-11)
    This is a conference presentation looking at the differences between dead and live forensics, and also at the advantages and disadvantages of the two. Also a discussion of how to achieve forensic soundness
  • Cronje, J (2011-11)
    A fast local image feature detector and descriptor that is implementable on the GPU is proposed. This method is the first GPU implementation of the popular FAST detector. A simple but novel method of feature orientation ...
  • Dlamini, I; Olivier, M; Sibiya, S (SATNAC 2009, 2009-08)
    Network forensics involves capturing, recording and analysing network activity in discovering the source of security policy violations or information assurance. The network forensic system that is described in this paper ...
  • Ahmed, R; Miyambo, ME (BISRU, 2014-09)
    The Scientifically Instrumented Impulse Measurement Apparatus (SIIMA) was developed to measure the total imparted impulse due to explosive loading. The instrument was designed to be used to compare the effects of variables ...
  • Vlok, JD; Olivier, JC (Institution of Engineering and Technology (IET), 2014-06)
    Several existing direct-sequence spread spectrum (DSSS) detection and estimation algorithms assume prior knowledge of the symbol period or sequence length, although very few sequence-length estimation techniques are available ...
  • Pieterse, H; Olivier, MS (Elsevier, 2014-09)
    Bluetooth is popular technology for short-range communications and is incorporated in mobile devices such as smartphones, tablet computers and laptops. Vulnerabilities associated with Bluetooth technology led to improved ...
  • Mafiri, MT; Nyareli, T; Ngwenya, B; Vogt, D (CSIR, 2008-11)
    The major gold and platinum deposits of South Africa occur in the Witwatersrand Basin (gold) and Bushveld Complex (platinum) (Henning et al., 1994; Carr et al., 1994; Cawthorn, 1999). While the origins and geology of the ...
  • Roodt, JHS; Oosthuizen, R; Jansen van Vuuren, JC (2010-04)
    This investigation was launched firstly to direct current Information Warfare definition and capability management activities toward establishing a Require Operational Capability (ROC) statement for a JCD capability, and ...
  • Leenen, L; Ghose, A (Pacific Rim International Conference on Artificial Intelligence (PRICAI-08), 2008-12)
    The Semiring Constraint Satisfaction Problem (SCSP) framework is a popular approach for the representation of partial constraint satisfaction problems. Considerable research has been done in solving SCSPs, but limited work ...
  • Naidoo, Darryl; Litvin, Ihar; Forbes, A (Optical Society of America, 2018-07)
    Laser brightness is a measure of the ability to deliver intense light to a target and encapsulates both the energy content and the beam quality. High-brightness lasers require that both parameters be maximized, yet standard ...
  • Lessing, M; Von Solms, SH (2008-05)
    The lack of a fully inclusive guideline document to assist the functioning of sufficient Information Security Governance is common in the business environment. This article focuses on developing such a guideline document, ...
  • Van Vuuren, JJ; Plint, G; Leenen, L; Zaaiman, J; Kadyamatimba, A; Phahlahmohlaka, J (2016)
    With the advancement of technology and proliferation of mobile and computing devices through all levels of society, cyber power is becoming an increasingly prominent driver in the attainment of national security for any ...
  • Luzipo, S; van Biljon, J; Herselman, M (IEEE, 2015-05)
    Business process adoption is one of the factors that determine an organisation's performance. While there are various factors that can have an impact on business processes adoption, this paper focuses on the impact of ...
  • Schwegmann, CP; Kleynhans, W; Salmon, BP; Mdakane, L (IEEE, 2015-07)
    The Maritime Domain Awareness initiative seeks to constantly improve the ways in which maritime information is collected. With the recent release of free Sentinel-1 imagery to the public, monitoring the maritime environment ...

Search ResearchSpace


Advanced Search

Browse

My Account