Iccws 2015 - The Proceedings of the 10th International Conference on Cyber Warfare and Security: ICCWS2015These Proceedings are the work of researchers contributing to the 10th International Conference on Cyber Warfare and Security ICCWS 2015, co hosted this year by the University of Venda and The Council for Scientific and Industrial Research. The conference is being held at the Kruger National Park, South Africa on the 24 25 March 2015. The Conference Chair is Dr Jannie Zaaiman from the University of Venda, South Africa, and the Programme Chair is Dr Louise Leenen from the Council for Scientific and Industrial Research, South Africa. |
Opinião das pessoas - Escrever uma crítica
Não foram encontradas quaisquer críticas nos locais habituais.
Índice
| 1 | |
| 10 | |
| 20 | |
| 30 | |
| 39 | |
| 49 | |
| 66 | |
| 78 | |
A Comparative Study of Correlation Engines for Luís Rosa Pedro Alves Tiago Cruz Paulo Simões | 277 |
Security Event Management and Edmundo Monteiro | 286 |
Persistent Technical Difficulties Preventing Effective Zaheer Shaik Ignus Swart and Nelishia Pillay | 295 |
An Augmentation of the Nobubele Angel Shozi and Mapule Modise | 305 |
Modelling the Index of Collective Intelligence in Aelita Skaržauskien and Monika Maiulien | 313 |
PHD Research Papers | 399 |
A Preliminary Review of ICS Security Frameworks Mercy Bere | 409 |
A Framework of Security Safeguards for Prittish Dala and Hein Venter | 415 |
| 86 | |
| 95 | |
| 102 | |
| 108 | |
| 118 | |
| 126 | |
Closing the Front Door to T V Raphiri M T Dlaminiand Hein Venter | 252 |
The Ingredients of Cyber Weapons Dusan Repel and Steven Hersee | 261 |
An Adaptive Approach to Achieving Acceptable David Rohret | 269 |
SCADA Systems Cyber Security for Critical Suhaila Ismail Elena Sitnikova and Jill Slay | 425 |
Obfuscating a CloudBased Botnet Towards Digital Victor Kebande and Hein Venter | 434 |
Surviving Advanced Persistent Threats a Ruchika Mehresh and Shambhu Upadhyaya | 445 |
A Trust Framework Model for Identity Nkosinathi Mpofu and Wynand van Van Staden | 455 |
Masters Research Papers | 463 |
A Best Practice Strategy Framework for Developing Victor Jaquire and Basie von Solms | 472 |
The Application of Hough TransformBased Cynthia Mlambo Fulufhelo Nelwamondo and | 481 |
Palavras e frases frequentes
activities adversary algorithm alignment analysis Android Android botnet application approach attributes authentication automated botnet capabilities challenges cloud computing correlation critical infrastructure cyber army cyber coercion cyber operations cyber warfare cyber weapons cyber-attacks cybersecurity cyberspace detection digital evidence digital forensic domain encryption ensure environment exploit Figure fingerprint framework function graphical passwords honeypot honeytoken identified identity management IdMaaS IEEE implementation information security Information Warfare integrity intelligence Internet malicious malware methodology military mobile devices monitoring National NIST nuclear ontology organisations packet paper performed personal information phishing PoPI Act potential proposed protection relay attacks resiliency Retrieved risk SCADA sector sensors server simulation smart card smartphones Snapchat Snowden social engineering software assurance South Africa specific strategy target techniques threats traffic trust users vulnerabilities
