Louise Leenen

Orcid: 0000-0002-9212-550X

According to our database1, Louise Leenen authored at least 27 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Adversarial Deep Reinforcement Learning for Cyber Security in Software Defined Networks.
CoRR, 2023

Exploring the Effects of Subversive Agents on Consensus-Seeking Processes Using a Multi-Agent Simulator.
Proceedings of the 13th International Conference on Simulation and Modeling Methodologies, 2023

Consensus Simulator for Organisational Structures.
Proceedings of the 13th International Conference on Simulation and Modeling Methodologies, 2023

Investigating Ontology-Based Data Access with GitHub.
Proceedings of the Semantic Web - 20th International Conference, 2023

2022
Model-Free Deep Reinforcement Learning in Software-Defined Networks.
CoRR, 2022

Don't be Caught Unaware: A Ransomware Primer with a Specific Focus on Africa.
Proceedings of the Human Choice and Digital by Default: Autonomy vs Digital Determination, 2022

2020
Cybersecurity and Cybercrime Combatting Culture for African Police Services.
Proceedings of the Human-Centric Computing in a Data-Driven Society, 2020

Modelling of the Complex Societal Problem of Establishing a National Energy Sufficiency Competence.
Proceedings of the IEEE 23rd International Conference on Information Fusion, 2020

2018
Cybersecurity Capability and Capacity Building for South Africa.
Proceedings of the This Changes Everything - ICT and Climate Change: What Can We Do?, 2018

2017
Formulating the Building Blocks for National Cyberpower.
Int. J. Cyber Warf. Terror., 2017

Underlying finite state machine for the social engineering attack detection model.
Proceedings of the 2017 Information Security for South Africa, 2017

2016
Semantic Technologies and Big Data Analytics for Cyber Defence.
Int. J. Cyber Warf. Terror., 2016

Using an Ontology for Network Attack Planning.
Int. J. Cyber Warf. Terror., 2016

Social engineering attack examples, templates and scenarios.
Comput. Secur., 2016

2015
Social Engineering Attack Detection Model: SEADMv2.
Proceedings of the International Conference on Cyberworlds, 2015

2014
Social engineering attack framework.
Proceedings of the 2014 Information Security for South Africa, 2014

Proposed Model for a Cybersecurity Centre of Innovation for South Africa.
Proceedings of the ICT and Society, 2014

Towards an Ontological Model Defining the Social Engineering Domain.
Proceedings of the ICT and Society, 2014

2012
An Approach to Governance of CyberSecurity in South Africa.
Int. J. Cyber Warf. Terror., 2012

A Computer Network Attack Taxonomy and Ontology.
Int. J. Cyber Warf. Terror., 2012

Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward.
Proceedings of the ICT Critical Infrastructures and Society, 2012

2010
A constraint-based solver for the military unit path finding problem.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

2008
Branch and Bound Algorithms to Solve Semiring Constraint Satisfaction Problems.
Proceedings of the PRICAI 2008: Trends in Artificial Intelligence, 2008

2007
Relaxations of semiring constraint satisfaction problems.
Inf. Process. Lett., 2007

Modeling and Solving Semiring Constraint Satisfaction Problems by Transformation to Weighted Semiring Max-SAT.
Proceedings of the AI 2007: Advances in Artificial Intelligence, 2007

2006
A Relaxation of a Semiring Constraint Satisfaction Problem Using Combined Semirings.
Proceedings of the PRICAI 2006: Trends in Artificial Intelligence, 2006

2002
Systematic Withdrawal.
J. Philos. Log., 2002


  Loading...