Follow
Ivan Burke
Ivan Burke
BlueVision ITM
Verified email at bitm.co.za - Homepage
Title
Cited by
Cited by
Year
Design of cyber security awareness game utilizing a social media framework
WA Labuschagne, I Burke, N Veerasamy, MM Eloff
2011 Information Security for South Africa, 1-9, 2011
492011
Classifying network attack scenarios using an ontology
RP Van Heerden, B Irwin, I Burke
Proceedings of the 7th International Conference on Information-Warfare …, 2012
422012
A computer network attack taxonomy and ontology
RP Van Heerden, B Irwin, ID Burke, L Leenen
International Journal of Cyber Warfare and Terrorism (IJCWT) 2 (3), 12-25, 2012
362012
A forensic readiness model for wireless networks
S Ngobeni, H Venter, I Burke
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International …, 2010
302010
Comparing models of offensive cyber operations
T Grant, I Burke, R Van Heerden
Leading Issues in Cyber Warfare and Security: Cyber Warfare and Security 2, 35, 2015
192015
The modelling of a digital forensic readiness approach for wireless local area networks
S Ngobeni, HS Venter, I Burke
IICM, 2012
132012
Automating cyber offensive operations for cyber challenges
I Burke, RP Van Heerden
Proceedings of the 11th International Conference on Cyber Warfare and …, 2016
82016
Design of cyber security awareness game utilizing a social media framework. In 2011 Information Security for South Africa (pp. 1-9)
WA Labuschagne, I Burke, N Veerasamy, MM Eloff
IEEE, 2011
72011
Developing a virtualised testbed environment in preparation for testing of network based attacks
R van Heerden, H Pieterse, I Burke, B Irwin
2013 International Conference on Adaptive Science and Technology, 1-8, 2013
62013
Design of cyber security awareness game utilizing a social media framework. 2011 Information Security for South Africa-Proceedings of the ISSA 2011 Conference
WA Labuschagne, I Burke, N Veerasamy, MM Eloff
52011
Evolution study of android botnets
H Pieterse, I Burke
Iccws 2015—The proceedings of the 10th international conference on cyber …, 2015
42015
Collaborative reference management system
WH Le Roux, ID Burke
42009
Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN …
ID Burke, A Herbert, R Mooi
Proceedings of the Annual Conference of the South African Institute of …, 2018
32018
A review of IPv6 security concerns
RP Van Heerden, IM Bester, ID Burke
Journal of Information Warfare 11 (3), 25-38, 2012
32012
Analysing the fairness of trust-based Mobile Ad hoc Network protocols: Comparing the fairness of AODV and TAODV protocols in scenario driven simulations
ID Burke, R van Heerden, MS Olivier
2011 Information Security for South Africa, 1-8, 2011
32011
Treating personal data like digital pollution
I Burke, RP Van Heerden
ECCWS 2017 16th European conference on cyber warfare and security. Reading …, 2017
22017
An investigation of the current state of mobile device management within South Africa
I Burke, F Mouton
ICIW 2013 Proceedings of the 8th International Conference on Information …, 2013
22013
Who Needs a Botnet if you Have Google?
I Burke, R van Heerden
The Proceedings of the 6th International Conference on Information Warfare …, 2011
22011
Lost packet warehousing service
ID Burke, MB Motlhabi, R Netshiya, H Pieterse
12021
Tracking botnets on Nation Research and Education Network
ID Burke, A Herbert
Proceedings of the 19th European Conference on Cyber Warfare and Security, 61-71, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–20