Veerasamy, NamoshaEloff, JHP2012-02-172012-02-172011-08Veerasamy, N and Eloff, JHP. 2011. UML modelling of network warfare examples. The Annual Information Security for South Africa Conference (ISSA 2011), Hayatt Regency Hotel, Rosebank, South Africa, 15-17 August 2011, 6ppISBN 978-1-4577-1482-5http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Veerasamy.pdfhttp://hdl.handle.net/10204/5581© 2011 EEE. Reprinted, with permission, from Veerasamy, N and Eloff, JHP. 2011. UML modelling of network warfare examples. The Annual Information Security for South Africa Conference (ISSA 2011), Hayatt Regency Hotel, Rosebank, South Africa, 15-17 August 2011. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of CSIR Information Services' products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.The aim of this paper is to clarify the concept of Network Warfare by looking at a typical example that illustrates both the exploitation and protection of information using various aspects of Information and Communication Technology (ICT). By using Unified Modelling Language (UML), the various role players, types of activities and sequences of actions can be represented in an illustrative format. This approach aims to elucidate Network Warfare in a more practical manner. The paper thus deals with four main issues that provide a motivation for modelling, an introduction to the models, the use case collaboration diagram and the sequence diagram of a typical example. The overall goal is to clarify the theoretical field of Network Warfare in a more practical manner.enNetwork warfareUnified Modelling Language (UML)Information securityUML modelling of network warfare examplesConference PresentationVeerasamy, N., & Eloff, J. (2011). UML modelling of network warfare examples. IEEE. http://hdl.handle.net/10204/5581Veerasamy, Namosha, and JHP Eloff. "UML modelling of network warfare examples." (2011): http://hdl.handle.net/10204/5581Veerasamy N, Eloff J, UML modelling of network warfare examples; IEEE; 2011. http://hdl.handle.net/10204/5581 .TY - Conference Presentation AU - Veerasamy, Namosha AU - Eloff, JHP AB - The aim of this paper is to clarify the concept of Network Warfare by looking at a typical example that illustrates both the exploitation and protection of information using various aspects of Information and Communication Technology (ICT). By using Unified Modelling Language (UML), the various role players, types of activities and sequences of actions can be represented in an illustrative format. This approach aims to elucidate Network Warfare in a more practical manner. The paper thus deals with four main issues that provide a motivation for modelling, an introduction to the models, the use case collaboration diagram and the sequence diagram of a typical example. The overall goal is to clarify the theoretical field of Network Warfare in a more practical manner. DA - 2011-08 DB - ResearchSpace DP - CSIR KW - Network warfare KW - Unified Modelling Language (UML) KW - Information security LK - https://researchspace.csir.co.za PY - 2011 SM - ISBN 978-1-4577-1482-5 T1 - UML modelling of network warfare examples TI - UML modelling of network warfare examples UR - http://hdl.handle.net/10204/5581 ER -