M.Sc.The present study was undertaken in a bid within the realm of the existing Internet working environment to meet the need for a more secure network-security process in terms of which possible risks to be incurred by Internet users could be identified and controlled by means of the appropriate countermeasures in real time. On launching the study, however, no such formal risk-analysis model has yet been developed specifically to effect risk analysis in real time. This, then, gave rise to the development of a prototype specifically aimed at the identification of risks that could pose a threat to Internet users' private data — the so-called "Real-time Risk Analysis" (RtRA) prototype. In so doing, the principal aim of the study, namely to im...
A thesis submitted for the degree of Doctor of PhilosophyNetwork security risk analysis has received...
It is not economically or technically feasible to make complex computersystems that are completely s...
M.Comm.The present study was undertaken in the realm of the Internet working environment, with its f...
M.Sc.The present study was undertaken in a bid within the realm of the existing Internet working env...
Throughout the years, computer networks have grown in size and complexity. This growth attributed to...
Throughout the years, computer networks have grown in size and complexity. This growth attributed to...
The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activi...
The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activi...
With an increasingly digitally connected society comes complexity, uncertainty, and risk. Network mo...
With an increasingly digitally connected society comes complexity, uncertainty, and risk. Network mo...
Inherent vulnerabilities in software applications running in a computer network, bringing in persona...
The Internet has become a global computing phenomenon, and during the 1990's has had more influence ...
It is not economically or technically feasible to make complex computersystems that are completely s...
It is not economically or technically feasible to make complex computersystems that are completely s...
M.Comm.The present study was undertaken in the realm of the Internet working environment, with its f...
A thesis submitted for the degree of Doctor of PhilosophyNetwork security risk analysis has received...
It is not economically or technically feasible to make complex computersystems that are completely s...
M.Comm.The present study was undertaken in the realm of the Internet working environment, with its f...
M.Sc.The present study was undertaken in a bid within the realm of the existing Internet working env...
Throughout the years, computer networks have grown in size and complexity. This growth attributed to...
Throughout the years, computer networks have grown in size and complexity. This growth attributed to...
The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activi...
The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activi...
With an increasingly digitally connected society comes complexity, uncertainty, and risk. Network mo...
With an increasingly digitally connected society comes complexity, uncertainty, and risk. Network mo...
Inherent vulnerabilities in software applications running in a computer network, bringing in persona...
The Internet has become a global computing phenomenon, and during the 1990's has had more influence ...
It is not economically or technically feasible to make complex computersystems that are completely s...
It is not economically or technically feasible to make complex computersystems that are completely s...
M.Comm.The present study was undertaken in the realm of the Internet working environment, with its f...
A thesis submitted for the degree of Doctor of PhilosophyNetwork security risk analysis has received...
It is not economically or technically feasible to make complex computersystems that are completely s...
M.Comm.The present study was undertaken in the realm of the Internet working environment, with its f...