Table of Contents
International Journal of Cyber Warfare and Terrorism Volume 6 • Issue 3 • July-September-2016 • ISSN: 1947-3435 • eISSN: 1947-3443 An official publication of the Information Resources Management Association
Special Issue on the 10th International Conference on Cyber Warfare and Security (ICCWS)
Editorial Preface iv Graeme Pye, Deakin University, Geelong, Australia Maximiliano Korstanje, University of Palermo, Buenos Aires, Argentina
Research Articles
1 Cyber-Security for ICS/SCADA: A South African Perspective;
Barend Pretorius, Transnet and University of KwaZulu-Natal, Durban, South Africa
Brett van Niekerk, Transnet and University of KwaZulu-Natal, Durban, South Africa
17 Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion;
Ignatius Swart, CSIR, Pretoria, South Africa
Barry Irwin, Rhodes University, Grahamstown, South Africa
Marthie M. Grobler, CSIR, Pretoria, South Africa
31 Deception Detection in Cyber Conflicts: A Use Case for the Cybersecurity Strategy Formation Framework;
Jim Q. Chen, DoD National Defense University, Washington D.C., USA
43 The Next Generation of Scientific-Based Risk Metrics: Measuring Cyber Maturity;
Lanier Watkins, Johns Hopkins University Information Security Institution, Baltimore, MD, USA
John S. Hurley, National Defense University, Washington D.C., USA
53 Semantic Technologies and Big Data Analytics for Cyber Defence;
Louise Leenen, DPSS, CSIR and Cape Peninsula University of Technology, Cape Town, South Africa
Thomas Meyer, CAIR, CSIR Meraka, and Computer Science, University of Cape Town, Cape Town, South Africa
65 Using an Ontology for Network Attack Planning;
Renier van Heerden, Department of Computer Science, Rhodes University, Grahamstown, South Africa
Peter Chan, Council for Scientific and Industrial Research (CSIR), Pretoria, South Africa Louise Leenen, Council for Scientific and Industrial Research (CSIR), Pretoria and Cape Peninsula University of
Technology, Cape Town, South Africa
Jacques Theron, South African National Defence Force (SANDF), Pretoria, South Africa
79 SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors; Suhaila Ismail, School of Information Technology and Mathematical Sciences, University of South Australia,
Adelaide, Australia Elena Sitnikova, Australian Centre for Cyber Security (ACCS), University of New South Wales at ADFA,
Canberra, Australia Jill Slay, Australian Centre for Cyber Security (ACCS), University of New South Wales at ADFA, Canberra,
Australia Copyright The International Journal of Cyber Warfare and Terrorism (IJCWT) (ISSN 1947-3435; eISSN 1947-3443), Copyright © 2016 IGI Global. All rights, including translation into other languages reserved by the publisher. No part of this journal may be reproduced or used in any form or by any means without written permission from the publisher, except for noncommercial, educational use including classroom teaching purposes. Product or company names used in this journal are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. The views expressed in this journal are those of the authors but not necessarily of IGI Global.
The International Journal of Cyber Warfare and Terrorism is indexed or listed in the following: Bacon’s Media Directory; Cabell’s Directories; DBLP; Google Scholar; INSPEC; MediaFinder; ProQuest Advanced Technologies & Aerospace Journals; ProQuest Computer Science Journals; ProQuest Illustrata: Technology; ProQuest Military Collection; ProQuest SciTech Journals; ProQuest Technology Journals; The Index of Information Systems Journals; The Standard Periodical Directory; Ulrich’s Periodicals Directory