GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Browsing Defence, peace, safety & security by Author "Von Solms, S"

Sort by: Order: Results:

  • Van Heerden, Renier P; Von Solms, S; Mooi, R (IST Africa, 2016-05)
    This paper introduces a classification scheme for the visual classification of cyber attacks. Through the use of the scheme, the impact of various cyber attacks throughout the history of South Africa are investigated and ...
  • Von Solms, S; Van Heerden, Renier P (2015-03)
    In June 2013, the Guardian newspaper started to disclose thousands of classified documents, which uncovered the existence of several mass surveillance programmes run by the National Security Agency (NSA) in the USA in ...
  • Von Solms, R; Von Solms, S (International Institute of Informatics and Systemics, 2015)
    Cyber safety has become critical in today's world. Young children specifically need to be educated to operate in a safe manner in cyberspace and to protect themselves in the process. Unfortunately, African and developing ...
  • Von Solms, R; Von Solms, S (2015-07)
    Cyber safety has become critical in today's world. Young children specifically need to be educated to operate in a safe manner in cyberspace and to protect themselves in the process. Unfortunately, African and developing ...
  • Von Solms, S; Peach, SW (IEEE Xplore, 2013-11)
    Network security risks are becoming an increasing threat as new network attack methods are constantly being developed by hackers to compromise secure networks and devices. The use of a network simulation environment that ...
  • Von Solms, S; Van Heerden, Renier P (2015-07)
    The development of the Network Emulation and Simulation Laboratory is motivated by the drive to contribute to the enhancement of the security and resilience of South Africa's critical information infrastructure. The goal ...
  • Jacobs, P; Von Solms, S; Grobler, M (Academic Conferences and Publishing International Ltd, 2015-07)
    Security Operation Centres (SOCs) and Computer Security Incident Response Teams (CSIRTs) or Computer Emergency Response Teams (CERTs) can play a pivotal role in the monitoring of, and response to threats, attacks and ...
  • Von Solms, S; Peach, SW (2014-07)
    Flexible, open source network emulation tools can provide network researchers with significant benefits regarding network behaviour and performance. The evaluation of these networks can benefit greatly from the integration ...
  • Von Solms, S (International Information Security South Africa, 2015-08)
    The use of debit and credit cards has become indispensable to consumers worldwide. This cashless method of payment offers flexibility and convenience. It eliminates the safety risk of carrying large cash amounts in person ...
  • Van Heerden, Renier P; Von Solms, S; Vorster, J (IIMC International Information Management Corporation, 2018-05)
    The integration of technology in the modern society provides many benefits, but with increased connectivity comes increased risk where governments, businesses and individuals are vulnerable to a variety of cyber-attacks. ...
  • Botha, Johannes G; Von Solms, S (Academic Conferences and Publishing International, also Curran, 2018-06)
    Multifunctional devices are employed in office networks for functionality and comfort, most often considered only as peripheral devices enabling the printing, copying and scanning of documents. Based on a study performed ...

Search ResearchSpace


Advanced Search

Browse

My Account