https://commons.ru.ac.za/vital/access/manager/Index ${session.getAttribute("locale")} 5 An analysis of fusing advanced malware email protection logs, malware intelligence and active directory attributes as an instrument for threat intelligence https://commons.ru.ac.za/vital/access/manager/Repository/vital:28506 Wed 31 May 2023 15:41:19 SAST ]]> Remote fidelity of Container-Based Network Emulators https://commons.ru.ac.za/vital/access/manager/Repository/vital:45199 Wed 25 May 2022 14:37:37 SAST ]]> Evaluation of the effectiveness of small aperture network telescopes as IBR data sources https://commons.ru.ac.za/vital/access/manager/Repository/vital:65849 Tue 18 Jul 2023 16:30:19 SAST ]]> A decision-making model to guide securing blockchain deployments https://commons.ru.ac.za/vital/access/manager/Repository/vital:44793 Tue 16 Nov 2021 19:35:25 SAST ]]> Towards a collection of cost-effective technologies in support of the NIST cybersecurity framework https://commons.ru.ac.za/vital/access/manager/Repository/vital:28199 Tue 16 May 2023 12:53:17 SAST ]]> NetwIOC: a framework for the automated generation of network-based IOCS for malware information sharing and defence https://commons.ru.ac.za/vital/access/manager/Repository/vital:27809 Tue 09 May 2023 10:46:58 SAST ]]> A systematic methodology to evaluating optimised machine learning based network intrusion detection systems https://commons.ru.ac.za/vital/access/manager/Repository/vital:65361 Fri 07 Jul 2023 12:32:10 SAST ]]>