Ivan Burke
Ivan Burke
Rhodes University, University of Pretoria, Council for Snientific and Industrial Research
Bestätigte E-Mail-Adresse bei csir.co.za - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Design of cyber security awareness game utilizing a social media framework
WA Labuschagne, I Burke, N Veerasamy, MM Eloff
2011 Information Security for South Africa, 1-9, 2011
302011
Classifying network attack scenarios using an ontology
RP van Heerden, B Irwin, I Burke
Proceedings of the 7th International Conference on Information-Warfare …, 2012
282012
A computer network attack taxonomy and ontology
RP Van Heerden, B Irwin, ID Burke, L Leenen
International Journal of Cyber Warfare and Terrorism (IJCWT) 2 (3), 12-25, 2012
192012
A forensic readiness model for wireless networks
S Ngobeni, H Venter, I Burke
IFIP International Conference on Digital Forensics, 107-117, 2010
192010
Comparing models of offensive cyber operations
T Grant, I Burke, R Van Heerden
Proceedings of the 7th International Warfare and Security, 108-121, 2012
142012
The modelling of a digital forensic readiness approach for wireless local area networks
S Ngobeni, HS Venter, I Burke
IICM, 2012
82012
Automating cyber offensive operations for cyber challenges
I Burke, RP Van Heerden
11th International Conference on Cyber Warfare and Security, 65-73, 2016
62016
Developing a virtualised testbed environment in preparation for testing of network based attacks
R van Heerden, H Pieterse, I Burke, B Irwin
2013 International Conference on Adaptive Science and Technology, 1-8, 2013
52013
Evolution study of android botnets
H Pieterse, I Burke
Iccws 2015—The proceedings of the 10th international conference on cyber …, 2015
32015
Analysing the fairness of trust-based Mobile Ad hoc Network protocols: Comparing the fairness of AODV and TAODV protocols in scenario driven simulations
ID Burke, R van Heerden, MS Olivier
2011 Information Security for South Africa, 1-8, 2011
32011
Collaborative reference management system
WH Le Roux, ID Burke
32009
A review of IPv6 security concerns
RP Van Heerden, IM Bester, ID Burke
Journal of Information Warfare 11 (3), 25-38, 2012
22012
Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN …
ID Burke, A Herbert, R Mooi
Proceedings of the Annual Conference of the South African Institute of …, 2018
12018
How to tame your android malware
I Burke, H Pieterse
Iccws 2015-The Proceedings of the 10th International Conference on Cyber …, 2015
12015
Comparing models of offensive cyber operations
T Grant, I Burke, R van Heerden
Leading Issues in Cyber Warfare and Security: Cyber Warfare and Security 2, 35, 2015
12015
An Investigation of the Current State of Mobile Device Management Within South Africa
ID Burke, F Mouton
ICIW 2013 Proceedings of the 8th International Conference on Information …, 2013
12013
Who Needs a Botnet if you Have Google?
I Burke, R van Heerden
The Proceedings of the 6th International Conference on Information Warfare …, 2011
12011
Initial investigation of concepts of command and control using an agent based approach
R Oosthuizen, I Burke, J Roodt
CSIR. Defence Peace Safety and Security, 2010
12010
Tracking Botnets on Nation Research and Education Network
ID Burke, A Herbert
ECCWS 2020 20th European Conference on Cyber Warfare and Security, 61, 2020
2020
The world is polluted with leaked cyber data
ID Burke, RP van Heerden
International Journal of Cyber Warfare and Terrorism (IJCWT) 7 (4), 35-51, 2017
2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20