GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Command control and information warfare

 

This collection has been changed from 'systems modelling' to 'command control and information warfare'. Please note that these changes will not interfere with your subscription

Recent Submissions

  • Burke, Ivan D; Herbert, A (Academic Conferences International (ACI), 2020-06)
    The South African National Research and Education Network (SANREN) proves network connectivity and services to all tertiary education networks and research councils within South Africa. The NREN forms part of South Africa’s ...
  • Phahlamohlaka, Letlibe J; Hefer, J (THREAT2019 Cybersecurity, 2019-06)
    Our aim in this paper is to analyse the possible impact of the Cybercrimes and Cybersecurity Bill on the institutions charged with the responsibility to enforce it as outlined in chapter 6 of the Bill. The analysis is ...
  • Van 't Wout, Magdalena C; Ball, Shaun V; Oosthuizen, Rudolph (International Command and Control Research & Technology Symposium, 2019-10)
    Modern day conflicts give rise to complex problems that traditional military intelligence approaches and tools struggle to resolve. There is a need for prediction and/or forecasting in the military domain based on effective ...
  • Phahlamohlaka, Letlibe J; Hefer, J (THREAT2019 Cybersecurity, 2019-06)
    Our aim in this paper is to analyse the possible impact of the Cybercrimes and Cybersecurity Bill on the institutions charged with the responsibility to enforce it as outlined in chapter 6 of the Bill. The analysis is ...
  • Masina, Bathusile N; Akande, Amos A; Mwakikunga, Bonex W (Materials Research Society, 2019-12)
    Highly oriented VO2 (M1) thin films are difficult to produce using non-crystalline substrates. For example, to produce such films on glass has required post-annealing or the use of a ZnO transparent layer. Here, we overcome ...
  • Oosthuizen, Rudolph; Van 't Wout, Magdalena C (International Command and Control Research & Technology Symposium, 2019-10)
    Implementing new technology into a sociotechnical system, such as a military intelligence system, is a challenging enterprise. The needs and expectations of the “social” users are critical in designing and implementing the ...
  • Van 't Wout, Magdalena C (ACPI, 2019-03)
    The current year, 2017, has already seen an excessive amount of cyber security disasters, apart from the continuation of standard corporate breaches. In the first half of the year, there had already been full-on campaign ...
  • Van't Wout, Magdalena C; Pieterse, Heloise; Ball, Shaun V (IEEE, 2019-10)
    An overview of the literature on military-related stress confirms that stress remains part of the deployed soldier’s life, whether it relates to concerns about his family back home, the nature of the military environment, ...
  • Mapimele, Fikile V; Mangoale, Bokang C (Academic, 2019-02)
    In recent years, cybercrime has become one of the most rapidly growing areas of crime. The emergence of new technologies has presented new cybercrime opportunities that are becoming more sophisticated. As a result, ...
  • Botha, Johannes G; Van ‘t Wout, Magdalena C; Leenen, L (Academic Conferences and Publishing International, 2019-07)
    Mobile messaging or chat Applications (Apps) have gained increasing popularity over the past decade. Large amounts of data are being transmitted over the internet when people make use of these Apps. Metadata and personal ...
  • Masango, Mfundo G; Mouton, Francois; Antony, Palesa; Mangoale, Bokang C (Cham: Springer, 2018-03)
    Websites have become a form of information distribution; usage of websites has seen a significant rise in the amount of information circulated on the Internet. Some businesses have created websites that display services ...
  • Oosthuizen, Rudolph; Pretorius, L; Mouton, Francois; Molekoa, Malinkeng M (International Conference on Cyber Warfare and Security (ICCWS ), 2019-02)
    As cyber-attacks pose a major threat to organisations, security measures are required to protect networks and information. Defence against these attacks requires substantial resources and investments from organisations. ...
  • Mahlangu, Thabo V; January, Sinethemba; Mashiane, Charmaine T; Dlamini, Thandokuhle M; Ngobeni, Sipho J; Ruxwana, Lennox N (2019-02)
    In the cyberspace, system defenders might have an idea of their own cybersecurity defense systems, but they surely have a partial view of the cyberspace battlefield and almost zero knowledge of the attackers. Evidently, ...
  • Pieterse, Heloise; Olivier, M; Van Heerden, Renier P (Springer, 2018-08)
    Ever improving technology allows smartphones to become an integral part of people's lives. The reliance on and ubiquitous use of smartphones render these devices rich sources of data. This data becomes increasingly important ...
  • Mtsweni, Jabu S; Gcaza, Noluxolo; Thaba, James M (ACM, 2018-09)
    Information and Communication Technologies (ICTs) present a number of vulnerabilities, threats and risks that could lead to devastating cyber-attacks resulting into hugh financial losses, legal implications, and reputational ...
  • Oosthuizen, Rudolph; Molekoa, Malinkeng M; Mouton, Francois (2018-11)
    Cyber-attacks pose a major modern era threat to organisations that use networks (e.g., corporate networks and the Internet) to facilitate and improve business processes. The complexity of Internet vulnerability and increasing ...
  • Oosthuizen, Rudolph; Venter, Jacobus P; Serfontein, Christian J (2018-11)
    Systems Engineering for complex and sociotechnical systems is becoming increasingly difficult due to growing complexity in the problem and solution space. This resulted to the development of Model Based Systems Engineering ...
  • Oosthuizen, Rudolph; Pretorius, P (2018-10)
    Systems Engineering has to solve increasingly complex problems through the implementation of solution systems. Solving contemporary complex problems requires Systems Thinking to address the emergent and evolutionary behavior. ...
  • Ngako, Kgothatso (Academic Conferences and Publishing Limited, 2018-06)
    With the rise of the IOT botnets which exploit vulnerable IOT devices, consumers with devices such as IP cameras accessible on the Internet might be involved in the next DDoS attack without even knowing it. Due to the ...
  • Botha, Johannes G; Von Solms, S (Academic Conferences and Publishing International, also Curran, 2018-06)
    Multifunctional devices are employed in office networks for functionality and comfort, most often considered only as peripheral devices enabling the printing, copying and scanning of documents. Based on a study performed ...

View more