GENERAL ENQUIRIES: Tel: + 27 12 841 2911 | Email: callcentre@csir.co.za

Command control and information warfare

 

This collection has been changed from 'systems modelling' to 'command control and information warfare'. Please note that these changes will not interfere with your subscription

Recent Submissions

  • Oosthuizen, Rudolph; Molekoa, Malinkeng M; Mouton, Francois (2018-11)
    Cyber-attacks pose a major modern era threat to organisations that use networks (e.g., corporate networks and the Internet) to facilitate and improve business processes. The complexity of Internet vulnerability and increasing ...
  • Oosthuizen, Rudolph; Venter, Jacobus P; Serfontein, Christian J (2018-11)
    Systems Engineering for complex and sociotechnical systems is becoming increasingly difficult due to growing complexity in the problem and solution space. This resulted to the development of Model Based Systems Engineering ...
  • Oosthuizen, Rudolph; Pretorius, P (2018-10)
    Systems Engineering has to solve increasingly complex problems through the implementation of solution systems. Solving contemporary complex problems requires Systems Thinking to address the emergent and evolutionary behavior. ...
  • Ngako, Kgothatso (Academic Conferences and Publishing Limited, 2018-06)
    With the rise of the IOT botnets which exploit vulnerable IOT devices, consumers with devices such as IP cameras accessible on the Internet might be involved in the next DDoS attack without even knowing it. Due to the ...
  • Botha, Johannes G; Von Solms, S (Academic Conferences and Publishing International, also Curran, 2018-06)
    Multifunctional devices are employed in office networks for functionality and comfort, most often considered only as peripheral devices enabling the printing, copying and scanning of documents. Based on a study performed ...
  • Dlamini, Innocentia Z; Malinga, Linda A; Masiane, Thulani; Tshiololi, Maduvha (Academic Conferences and Publishing Limited, also Curran, 2018-06)
    South Africa has always been a protesting nation that fights for a righteous cause. These protests were witnessed at the Sharpeville Massacre of 1960 when blacks refused to carry passbooks (Identity books) everywhere they ...
  • Van Heerden, Renier; Von Solms, S; Vorster, J (IIMC International Information Management Corporation, 2018-05)
    The integration of technology in the modern society provides many benefits, but with increased connectivity comes increased risk where governments, businesses and individuals are vulnerable to a variety of cyber-attacks. ...
  • Phahlamohlaka, J; Dlamini, ZI; Malinga, L; Ngobeni, S; Mnisi, T (IEEE, 2015-11)
    South African communities are constantly being developed through new ICT projects and technologies which are initiated by individuals, government and private organisations. The problem with these developments is that they ...
  • Labuschagne, William A; Veerasamy, Namosha (Academic Conferences and Publishing, 2017-06)
    Technology has integrated with society resulting in the dependence of its availability to conduct daily activities. In the corporate domain the availability of information is critical to decision making as it affects the ...
  • Venter, Jacobus P; Van Ellewee, Minrie (2017-09)
    It is argued that the definition of the required operational capabilities in the short and long term is an essential element of command. Defence Capability Management can be a cumbersome, long and very resource intensive ...
  • Oosthuizen, Rudolph (INCOSE (International Council on Systems Engineering), 2017-10)
    In Systems Engineering (SE), modelling is applied to capture and represent the mental models of the systems’ stakeholders. These models, consisting of various viewpoints on the system structure and behavior, can be used ...
  • Burke, Ivan D; van Heerden, Renier P (IGI Global, 2017-10)
    Data breaches are becoming more common and numerous every day, where huge amount of data (corporate and personal) are leaked more frequently than ever. Corporate responses to data breaches are insufficient, when commonly ...
  • Dlamini, Thandokuhle M; Eloff, JHP; Venter, HS; Eloff, MM; Henha Eyono, RPS; Mosola, NN (2017-09)
    This paper investigates how to effectively stop an attacker from using compromised user credentials to gain authorized entry to systems that they are otherwise not authorised to access. The proposed solution extends previous ...
  • Koen, Hildegarde S (2017-02)
    Approximately three rhinos are poached daily in South Africa. Rhino poaching is a serious problem that affects not only the rhino population of South Africa, but also the rhino population of the world. South Africa has the ...
  • Mosola, NN; Dlamini, Thandokuhle M; Blackledge, JM; Eloff, JHP; Venter, HS (2017-09)
    Cloud computing brings flexible and cost effective services. However, security concerns plague the cloud. Data confidentiality is one of the concerns inhibiting the adoption of cloud computing. This concern stems from ...
  • Burke, Ivan D; Van Heerden, Renier P (2017-06)
    During the past 10 years data breaches have become more frequent than ever. Large volumes of personal and corporate data are being leaked via these breaches. The corporate responses to these breaches, as well as, the ...
  • Asiru, OF; Dlamini, Moses T; Blackledge, M (2017-06)
    Computer viruses have become complex and operates in a stealth mode to avoid detection. New viruses are argued to be created each and every day. However, most of these supposedly ‘new’ viruses are not completely new. Most ...
  • Swart, I; Irwin, B; Grobler, M (Academic Bookshop, UK, 2015-03)
    A proliferation of cyber security strategies have recently been published around the world with as many as thirty five strategies documented since 2009. These published strategies indicate the growing need to obtain a clear ...
  • Thaba, Mphahlela (2017-05)
    The evolution of military warfare and its increasing complexity has made planning for future military deployments more difficult. The need to plan for more uncertain military operating environments makes it more complex. ...
  • Mtsweni, Jabu; Shozi, Nobubele A; Matenche, Kqwadi; Mutemwa, Muyowa; Mkhonto, Njabulo; Jansen van Vuuren, Joey (2016-03)
    Big Data is transforming the global technological landscape by elevating online information access required for addressing everyday challenges, such as detecting in real-time the spread of diseases within areas of interest. ...

View more