Ivan Burke
Ivan Burke
BlueVision ITM
Verified email at - Homepage
Cited by
Cited by
Design of cyber security awareness game utilizing a social media framework
WA Labuschagne, I Burke, N Veerasamy, MM Eloff
2011 Information Security for South Africa, 1-9, 2011
Classifying network attack scenarios using an ontology
RP Van Heerden, B Irwin, I Burke
Proceedings of the 7th International Conference on Information-Warfare …, 2012
A computer network attack taxonomy and ontology
RP Van Heerden, B Irwin, ID Burke, L Leenen
International Journal of Cyber Warfare and Terrorism (IJCWT) 2 (3), 12-25, 2012
A forensic readiness model for wireless networks
S Ngobeni, H Venter, I Burke
IFIP International Conference on Digital Forensics, 107-117, 2010
Comparing models of offensive cyber operations
T Grant, I Burke, R van Heerden
Leading Issues in Cyber Warfare and Security: Cyber Warfare and Security 2, 35, 2015
The modelling of a digital forensic readiness approach for wireless local area networks
S Ngobeni, HS Venter, I Burke
IICM, 2012
Automating cyber offensive operations for cyber challenges
I Burke, RP Van Heerden
Proceedings of the 11th International Conference on Cyber Warfare and …, 2016
Developing a virtualised testbed environment in preparation for testing of network based attacks
R van Heerden, H Pieterse, I Burke, B Irwin
2013 International Conference on Adaptive Science and Technology, 1-8, 2013
Evolution study of android botnets
H Pieterse, I Burke
Iccws 2015—The proceedings of the 10th international conference on cyber …, 2015
Analysing the fairness of trust-based Mobile Ad hoc Network protocols: Comparing the fairness of AODV and TAODV protocols in scenario driven simulations
ID Burke, R van Heerden, MS Olivier
2011 Information Security for South Africa, 1-8, 2011
Collaborative reference management system
WH Le Roux, ID Burke
Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN …
ID Burke, A Herbert, R Mooi
Proceedings of the Annual Conference of the South African Institute of …, 2018
A review of IPv6 security concerns
RP Van Heerden, IM Bester, ID Burke
Journal of Information Warfare 11 (3), 25-38, 2012
Who Needs a Botnet if you Have Google?
I Burke, R van Heerden
The Proceedings of the 6th International Conference on Information Warfare …, 2011
Lost packet warehousing service
ID Burke, MB Motlhabi, R Netshiya, H Pieterse
Tracking botnets on Nation Research and Education Network
ID Burke, A Herbert
Proceedings of the 19th European Conference on Cyber Warfare and Security, 61-71, 2020
Treating personal data like digital pollution
ID Burke, RP Van Heerden
ECCWS 2017 16th European conference on cyber warfare and security. Reading …, 2017
How to tame your android malware
I Burke, H Pieterse
10th International Conference on Cyber Warfare and Security, Kruger National …, 2015
An Investigation of the Current State of Mobile Device Management Within South Africa
ID Burke, F Mouton
ICIW 2013 Proceedings of the 8th International Conference on Information …, 2013
Initial investigation of concepts of command and control using an agent based approach
R Oosthuizen, ID Burke, J Roodt
CSIR. Defence Peace Safety and Security, 2010
The system can't perform the operation now. Try again later.
Articles 1–20