GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing Defence, peace, safety & security by Author "Venter, HS"

Sort by: Order: Results:

  • Dlamini, Thandokuhle M; Eloff, JHP; Venter, HS; Eloff, MM; Henha Eyono, RPS; Mosola, NN (2017-09)
    This paper investigates how to effectively stop an attacker from using compromised user credentials to gain authorized entry to systems that they are otherwise not authorised to access. The proposed solution extends previous ...
  • Mosola, NN; Dlamini, Thandokuhle M; Blackledge, JM; Eloff, JHP; Venter, HS (2017-09)
    Cloud computing brings flexible and cost effective services. However, security concerns plague the cloud. Data confidentiality is one of the concerns inhibiting the adoption of cloud computing. This concern stems from ...
  • Ngobeni, SJ; Venter, HS (2009-07)
    The proliferation of wireless mobile communication technology has emerged and this has resulted in the increase of the wireless users. On the other hand, cyber crime in WLANs has appeared to be gradually increasing world ...
  • Ngobeni, SJ; Venter, HS (2008-09)
    There are currently many different types of wireless crime investigation tools designed for different purposes in order to track down intruders of wireless crime, like Intrusion Detection Systems (IDSs), Wlan-Jack, HotSpotter, ...
  • Ngobeni, S; Venter, HS; Burke, Ivan D (2010-01)
    Over the past decade, wireless mobile communication technology based on IEEE 802.11 Wireless Local Area Networks (WLANs) has been adopted worldwide on a large scale, resulting in the increase of the wireless users. However, ...
  • Ledwaba, Lehlogonolo PI; Hancke, GP; Venter, HS; Isaac, Sherrin J (IEEE, 2018-01)
    In past years, cryptography has been considered a difficult task to achieve on sensor nodes for the Internet of Energy (IoE) owing to the resource-constrained nature of 8-bit and 16-bit microcontroller units (MCUs). Previous ...
  • Mouton, F; Leenen, L; Venter, HS (IEEE Xplore, 2015-10)
    Information security is a fast-growing discipline, and therefore the effectiveness of security measures to protect sensitive information needs to be increased. Since people are generally susceptible to manipulation, humans ...
  • Mouton, Francois; Leenen, Louise; Venter, HS (Elsevier, 2016-06)
    The field of information security is a fast-growing discipline. Even though the effectiveness of security measures to protect sensitive information is increasing, people remain susceptible to manipulation and thus the human ...
  • Ledwaba, Lehlogonolo; Venter, HS (AIS Electronic Library, 2017-01)
    The ability to network machinery and devices that are otherwise isolated is highly attractive to industry. This has led to growth in the use of cyber-physical systems (CPSs) with existing infrastructure. However, coupling ...
  • Mouton, Francois; Nottingham, Alastair T; Leenen, Louise; Venter, HS (IEEE, 2017-08)
    Information security is a fast-growing discipline, and relies on continued improvement of security measures to protect sensitive information. In general, human operators are often highly susceptible to manipulation, and ...

Search ResearchSpace


Advanced Search

Browse

My Account