Table of Contents

International Journal of Cyber Warfare and Terrorism Volume 6 • Issue 3 • July-September-2016 • ISSN: 1947-3435 • eISSN: 1947-3443 An official publication of the Information Resources Management Association

Special Issue on the 10th International Conference on Cyber Warfare and Security (ICCWS)

Editorial Preface iv Graeme Pye, Deakin University, Geelong, Maximiliano Korstanje, University of Palermo, Buenos Aires, Argentina

Research Articles

1 Cyber-Security for ICS/SCADA: A South African Perspective;

Barend Pretorius, Transnet and University of KwaZulu-Natal, Durban, South Africa

Brett van Niekerk, Transnet and University of KwaZulu-Natal, Durban, South Africa

17 Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion;

Ignatius Swart, CSIR, Pretoria, South Africa

Barry Irwin, Rhodes University, Grahamstown, South Africa

Marthie M. Grobler, CSIR, Pretoria, South Africa

31 Deception Detection in Cyber Conflicts: A Use Case for the Cybersecurity Strategy Formation Framework;

Jim Q. Chen, DoD National Defense University, Washington D.C., USA

43 The Next Generation of Scientific-Based Risk Metrics: Measuring Cyber Maturity;

Lanier Watkins, Johns Hopkins University Information Security Institution, Baltimore, MD, USA

John S. Hurley, National Defense University, Washington D.C., USA

53 Semantic Technologies and Big Data Analytics for Cyber Defence;

Louise Leenen, DPSS, CSIR and Cape Peninsula University of Technology, Cape Town, South Africa

Thomas Meyer, CAIR, CSIR Meraka, and Computer Science, University of Cape Town, Cape Town, South Africa

65 Using an Ontology for Network Attack Planning;

Renier van Heerden, Department of Computer Science, Rhodes University, Grahamstown, South Africa

Peter Chan, Council for Scientific and Industrial Research (CSIR), Pretoria, South Africa Louise Leenen, Council for Scientific and Industrial Research (CSIR), Pretoria and Cape Peninsula University of

Technology, Cape Town, South Africa

Jacques Theron, South African National Defence Force (SANDF), Pretoria, South Africa

79 SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors; Suhaila Ismail, School of Information Technology and Mathematical Sciences, University of South Australia,

Adelaide, Australia Elena Sitnikova, Australian Centre for Cyber Security (ACCS), University of New South Wales at ADFA,

Canberra, Australia Jill Slay, Australian Centre for Cyber Security (ACCS), University of New South Wales at ADFA, ,

Australia Copyright The International Journal of Cyber Warfare and Terrorism (IJCWT) (ISSN 1947-3435; eISSN 1947-3443), Copyright © 2016 IGI Global. All rights, including translation into other languages reserved by the publisher. No part of this journal may be reproduced or used in any form or by any means without written permission from the publisher, except for noncommercial, educational use including classroom teaching purposes. Product or company names used in this journal are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. The views expressed in this journal are those of the authors but not necessarily of IGI Global.

The International Journal of Cyber Warfare and Terrorism is indexed or listed in the following: Bacon’s Media Directory; Cabell’s Directories; DBLP; Google Scholar; INSPEC; MediaFinder; ProQuest Advanced Technologies & Aerospace Journals; ProQuest Computer Science Journals; ProQuest Illustrata: Technology; ProQuest Military Collection; ProQuest SciTech Journals; ProQuest Technology Journals; The Index of Information Systems Journals; The Standard Periodical Directory; Ulrich’s Periodicals Directory