IWSP'14 - Downloads
Print

Downloads and Call for Papers

 

This page contains files and links to previous workshop proceedings and presentations.

 

Call for Papers


Click to download the call for papers

 

Paper Template


Click to download the template


2012 Proceedings and Presentations


Click here to download the proceedings  3.2 MB .PDF


Presentations:

Welcome  Dr Jackie Phahlamohlaka

Keynote: An IW Perspective on Entropy Warfare  Jacques Theron

The Future of Command and Contol: Determining Force Readiness at the Push of a Button Marthie Grobler and Jaco Robertson 

Mobile Devices and the Military: Useful Tool or Significant Threat?  Brett van Niekerk and Manoj Maharaj

Using a Layered Model to place EW in Context within the Informationsphere  Francois De Villiers Maasdorp and Warren Du Plessis

An Exploratory Framework For Non-Aggressive Response to Hostile Network Traffic  Samuel Oswald Hunter, Etienne Stalmans, Barry Irwin and John Richter

Social Recruiting: A Next Generation Social Engineering Attack  Adam Schoeman, Barry Irwin, and John Richter

A Review of IPv6 Security Concerns  Renier van Heerden, Naas Bester and Ivan Burke

A Prologue to Estimating the Intent of a Potential Rhino Poacher  Hildegarde Mouton and JP de Villiers

Protecting E-mail Anonymity With an Anonymizer Bouncer  Mercia Malan and Francois Mouton

Towards a Cyberterrorism Life-cycle Model  Namosha Veerasamy, Marthie Grobler and Basie Von Solms


Previous Proceedings

Previous workshop proceedings and presentations may be found here

 

Last Updated on Monday, 07 April 2014 09:11