Design of cyber security awareness game utilizing a social media framework WA Labuschagne, I Burke, N Veerasamy, MM Eloff 2011 Information Security for South Africa, 1-9, 2011 | 50 | 2011 |
Classifying network attack scenarios using an ontology RP Van Heerden, B Irwin, I Burke Proceedings of the 7th International Conference on Information-Warfare …, 2012 | 42 | 2012 |
A computer network attack taxonomy and ontology RP Van Heerden, B Irwin, ID Burke, L Leenen International Journal of Cyber Warfare and Terrorism (IJCWT) 2 (3), 12-25, 2012 | 36 | 2012 |
A forensic readiness model for wireless networks S Ngobeni, H Venter, I Burke Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International …, 2010 | 34 | 2010 |
Comparing models of offensive cyber operations T Grant, I Burke, R Van Heerden Leading Issues in Cyber Warfare and Security: Cyber Warfare and Security 2, 35, 2015 | 21 | 2015 |
The modelling of a digital forensic readiness approach for wireless local area networks S Ngobeni, HS Venter, I Burke IICM, 2012 | 14 | 2012 |
Automating cyber offensive operations for cyber challenges I Burke, RP Van Heerden Proceedings of the 11th International Conference on Cyber Warfare and …, 2016 | 8 | 2016 |
Design of cyber security awareness game utilizing a social media framework. In 2011 Information Security for South Africa (pp. 1-9) WA Labuschagne, I Burke, N Veerasamy, MM Eloff IEEE, 2011 | 8 | 2011 |
Developing a virtualised testbed environment in preparation for testing of network based attacks R van Heerden, H Pieterse, I Burke, B Irwin 2013 International Conference on Adaptive Science and Technology, 1-8, 2013 | 6 | 2013 |
Design of cyber security awareness game utilizing a social media framework. 2011 Information Security for South Africa-Proceedings of the ISSA 2011 Conference WA Labuschagne, I Burke, N Veerasamy, MM Eloff | 5 | 2011 |
Evolution study of android botnets H Pieterse, I Burke Iccws 2015—The proceedings of the 10th international conference on cyber …, 2015 | 4 | 2015 |
Collaborative reference management system WH Le Roux, ID Burke | 4 | 2009 |
Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN … ID Burke, A Herbert, R Mooi Proceedings of the Annual Conference of the South African Institute of …, 2018 | 3 | 2018 |
A review of IPv6 security concerns RP Van Heerden, IM Bester, ID Burke Journal of Information Warfare 11 (3), 25-38, 2012 | 3 | 2012 |
Analysing the fairness of trust-based Mobile Ad hoc Network protocols: Comparing the fairness of AODV and TAODV protocols in scenario driven simulations ID Burke, R van Heerden, MS Olivier 2011 Information Security for South Africa, 1-8, 2011 | 3 | 2011 |
Treating personal data like digital pollution I Burke, RP Van Heerden ECCWS 2017 16th European conference on cyber warfare and security. Reading …, 2017 | 2 | 2017 |
How to tame your android malware I Burke, H Pieterse 10th International Conference on Cyber Warfare and Security, Kruger National …, 2015 | 2 | 2015 |
An investigation of the current state of mobile device management within South Africa I Burke, F Mouton ICIW 2013 Proceedings of the 8th International Conference on Information …, 2013 | 2 | 2013 |
Who Needs a Botnet if you Have Google? I Burke, R van Heerden The Proceedings of the 6th International Conference on Information Warfare …, 2011 | 2 | 2011 |
Lost packet warehousing service ID Burke, MB Motlhabi, R Netshiya, H Pieterse | 1 | 2021 |