The Description Logic Handbook: Theory, Implementation, and Applications, 2003. ,
DOI : 10.1017/CBO9780511711787
The Semantic Web, Scientific American, vol.284, issue.5, pp.33-43, 2001. ,
DOI : 10.1038/scientificamerican0501-34
Ontological Approach to Military Knowledge Modeling and Management . Symposium on Military Data and Information Fusion, 2003. ,
Convention on Cybercrime. CETS No.: 185 Available from: http://conventions.coe.int/Treaty, 2010. ,
An ontology-based approach to react to network attacks, 2008 Third International Conference on Risks and Security of Internet and Systems, pp.280-305, 2009. ,
DOI : 10.1109/CRISIS.2008.4757461
State Security in Charge of Cybercrime Plans Available from: http://www.iol.co.za/dailynews/news/state-security-in-charge-of-cybercrime-plans- 1, p.1238243, 2012. ,
A National Strategy for an Effective Cybersecurity Approach and Culture, 2010 International Conference on Availability, Reliability and Security, pp.370-373, 2010. ,
DOI : 10.1109/ARES.2010.119
Common Challenges Faced During the Establishment of a CSIRT. Presented at the ISSA conference 2010, 2010. ,
Cyber Awareness Initiatives in South Africa: A National Perspective, Proceedings of Southern African Cyber Security Awareness Workshop (SACSAW) 2011, pp.32-41, 2011. ,
Global Cyber Trends a South African Reality. Article to be presented at IST-Africa, Tanzania, 2012. ,
A translation approach to portable ontology specifications, Knowledge Acquisition, vol.5, issue.2, pp.191-220, 1993. ,
DOI : 10.1006/knac.1993.1008
Cyber Security Policy Will Go Before Cabinet For Approval This Year. Available from: http://www.defenceweb.co.za/index.php?option=com_content&view=article&id=13783:cy ber-security-policy-will-go-before-cabinet-for-approval-this- year&catid=48, pp.20-20, 2011. ,
Internet Usage Statistics for Africa Available from, 2012. ,
The Influence of Cyber Security Levels of South African Citizens on National Security, Proceedings of ICIW 2012, pp.138-147, 2012. ,
Cyberpower and National Security: Policy Recommendations for a Strategic Framework, Cyberpower and National Security, pp.3-23, 2009. ,
State of South Africa's Internet. MyBroadband.co.za Available from: http://mybroadband.co.za/news/broadband/17987-state-of-south-africa-s-Internet.html, [Accessed, 2011. ,
Ontology Development 101: A Guide to Creating Your First Ontology, 2001. ,
Cyber Security Awareness Toolkit for National Security: an Approach to South Africa's Cyber Security Policy Implementation, Proceedings of the First IFIP TC9/ TC11 Southern African Cyber Security Awareness Workshop, pp.1-14, 2011. ,
Available from: http://protege, 2012. ,
Wicked Problems Structuring Social Messes with Morphological Analysis Adapted from a lecture given at the Royal Institute of Technology in Stockholm, 2004. ,
The Ontology of Command and Control, Proceedings of the 14th International Command and Control Research and Technology Symposium, 2009. ,