IWSP'14 - Downloads

Downloads and Call for Papers


This page contains files and links to previous workshop proceedings and presentations.


Call for Papers

Click to download the call for papers


Paper Template

Click to download the template

2012 Proceedings and Presentations

Click here to download the proceedings  3.2 MB .PDF


Welcome  Dr Jackie Phahlamohlaka

Keynote: An IW Perspective on Entropy Warfare  Jacques Theron

The Future of Command and Contol: Determining Force Readiness at the Push of a Button Marthie Grobler and Jaco Robertson 

Mobile Devices and the Military: Useful Tool or Significant Threat?  Brett van Niekerk and Manoj Maharaj

Using a Layered Model to place EW in Context within the Informationsphere  Francois De Villiers Maasdorp and Warren Du Plessis

An Exploratory Framework For Non-Aggressive Response to Hostile Network Traffic  Samuel Oswald Hunter, Etienne Stalmans, Barry Irwin and John Richter

Social Recruiting: A Next Generation Social Engineering Attack  Adam Schoeman, Barry Irwin, and John Richter

A Review of IPv6 Security Concerns  Renier van Heerden, Naas Bester and Ivan Burke

A Prologue to Estimating the Intent of a Potential Rhino Poacher  Hildegarde Mouton and JP de Villiers

Protecting E-mail Anonymity With an Anonymizer Bouncer  Mercia Malan and Francois Mouton

Towards a Cyberterrorism Life-cycle Model  Namosha Veerasamy, Marthie Grobler and Basie Von Solms

Previous Proceedings

Previous workshop proceedings and presentations may be found here


Last Updated on Monday, 07 April 2014 09:11