GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Command control and information warfare

 

This collection has been changed from 'systems modelling' to 'command control and information warfare'. Please note that these changes will not interfere with your subscription

Recent Submissions

  • Oosthuizen, Rudolph; Pretorius, L; Mouton, Francois; Molekoa, Malinkeng M (International Conference on Cyber Warfare and Security (ICCWS ), 2019-02)
    As cyber-attacks pose a major threat to organisations, security measures are required to protect networks and information. Defence against these attacks requires substantial resources and investments from organisations. ...
  • Mahlangu, Thabo V; January, Sinethemba; Mashiane, Charmaine T; Dlamini, Thandokuhle M; Ngobeni, Sipho J; Ruxwana, Lennox N (2019-02)
    In the cyberspace, system defenders might have an idea of their own cybersecurity defense systems, but they surely have a partial view of the cyberspace battlefield and almost zero knowledge of the attackers. Evidently, ...
  • Pieterse, Heloise; Olivier, M; Van Heerden, Renier P (Springer, 2018-08)
    Ever improving technology allows smartphones to become an integral part of people's lives. The reliance on and ubiquitous use of smartphones render these devices rich sources of data. This data becomes increasingly important ...
  • Mtsweni, Jabu S; Gcaza, Noluxolo; Thaba, James M (ACM, 2018-09)
    Information and Communication Technologies (ICTs) present a number of vulnerabilities, threats and risks that could lead to devastating cyber-attacks resulting into hugh financial losses, legal implications, and reputational ...
  • Oosthuizen, Rudolph; Molekoa, Malinkeng M; Mouton, Francois (2018-11)
    Cyber-attacks pose a major modern era threat to organisations that use networks (e.g., corporate networks and the Internet) to facilitate and improve business processes. The complexity of Internet vulnerability and increasing ...
  • Oosthuizen, Rudolph; Venter, Jacobus P; Serfontein, Christian J (2018-11)
    Systems Engineering for complex and sociotechnical systems is becoming increasingly difficult due to growing complexity in the problem and solution space. This resulted to the development of Model Based Systems Engineering ...
  • Oosthuizen, Rudolph; Pretorius, P (2018-10)
    Systems Engineering has to solve increasingly complex problems through the implementation of solution systems. Solving contemporary complex problems requires Systems Thinking to address the emergent and evolutionary behavior. ...
  • Ngako, Kgothatso (Academic Conferences and Publishing Limited, 2018-06)
    With the rise of the IOT botnets which exploit vulnerable IOT devices, consumers with devices such as IP cameras accessible on the Internet might be involved in the next DDoS attack without even knowing it. Due to the ...
  • Botha, Johannes G; Von Solms, S (Academic Conferences and Publishing International, also Curran, 2018-06)
    Multifunctional devices are employed in office networks for functionality and comfort, most often considered only as peripheral devices enabling the printing, copying and scanning of documents. Based on a study performed ...
  • Dlamini, Innocentia Z; Malinga, Linda A; Masiane, Thulani; Tshiololi, Maduvha (Academic Conferences and Publishing Limited, also Curran, 2018-06)
    South Africa has always been a protesting nation that fights for a righteous cause. These protests were witnessed at the Sharpeville Massacre of 1960 when blacks refused to carry passbooks (Identity books) everywhere they ...
  • Van Heerden, Renier; Von Solms, S; Vorster, J (IIMC International Information Management Corporation, 2018-05)
    The integration of technology in the modern society provides many benefits, but with increased connectivity comes increased risk where governments, businesses and individuals are vulnerable to a variety of cyber-attacks. ...
  • Phahlamohlaka, J; Dlamini, ZI; Malinga, L; Ngobeni, S; Mnisi, T (IEEE, 2015-11)
    South African communities are constantly being developed through new ICT projects and technologies which are initiated by individuals, government and private organisations. The problem with these developments is that they ...
  • Labuschagne, William A; Veerasamy, Namosha (Academic Conferences and Publishing, 2017-06)
    Technology has integrated with society resulting in the dependence of its availability to conduct daily activities. In the corporate domain the availability of information is critical to decision making as it affects the ...
  • Venter, Jacobus P; Van Ellewee, Minrie (2017-09)
    It is argued that the definition of the required operational capabilities in the short and long term is an essential element of command. Defence Capability Management can be a cumbersome, long and very resource intensive ...
  • Oosthuizen, Rudolph (INCOSE (International Council on Systems Engineering), 2017-10)
    In Systems Engineering (SE), modelling is applied to capture and represent the mental models of the systems’ stakeholders. These models, consisting of various viewpoints on the system structure and behavior, can be used ...
  • Burke, Ivan D; van Heerden, Renier P (IGI Global, 2017-10)
    Data breaches are becoming more common and numerous every day, where huge amount of data (corporate and personal) are leaked more frequently than ever. Corporate responses to data breaches are insufficient, when commonly ...
  • Dlamini, Thandokuhle M; Eloff, JHP; Venter, HS; Eloff, MM; Henha Eyono, RPS; Mosola, NN (2017-09)
    This paper investigates how to effectively stop an attacker from using compromised user credentials to gain authorized entry to systems that they are otherwise not authorised to access. The proposed solution extends previous ...
  • Koen, Hildegarde S (2017-02)
    Approximately three rhinos are poached daily in South Africa. Rhino poaching is a serious problem that affects not only the rhino population of South Africa, but also the rhino population of the world. South Africa has the ...
  • Mosola, NN; Dlamini, Thandokuhle M; Blackledge, JM; Eloff, JHP; Venter, HS (2017-09)
    Cloud computing brings flexible and cost effective services. However, security concerns plague the cloud. Data confidentiality is one of the concerns inhibiting the adoption of cloud computing. This concern stems from ...
  • Burke, Ivan D; Van Heerden, Renier P (2017-06)
    During the past 10 years data breaches have become more frequent than ever. Large volumes of personal and corporate data are being leaked via these breaches. The corporate responses to these breaches, as well as, the ...

View more