Author:Grant, T; Burke, Ivan D; Van Heerden, Renier PDate:Mar 2012The purpose of this paper is to find, formalise, and compare models of the offensive cyber operations process available in the open scientific literature. Seven models were sufficiently well described for formalisation using Structured Analysis ...Read more
Author:Grant, T; Burke, Ivan D; Van Heerden, Renier PDate:Oct 2015Based on the idea that offensive cyber operations should be studied and merge from the darkness in which they typically hide, Grant and his colleagues embarked on a research program to explore the potential answers to the question, " What ...Read more