Recently added

Computer Science: Recent submissions

  • Mbona, Innocent; Eloff, Jan H.P. (Oxford University Press, 2023)
    Users of online social network (OSN) platforms, e.g. Twitter, are not always humans, and social bots (referred to as bots) are highly prevalent. State-of-the-art research demonstrates that bots can be broadly categorized ...
  • Pool, Johannes Hendrik; Venter, H.S. (Hein) (MDPI, 2022-08-12)
    Cyber physical systems (CPSs) are found in many aspects of daily life, and they control and protect energy production, manufacturing and even healthcare. Due to long lifecycles and the use of legacy technologies, its ...
  • Gerber, Mia; Pillay, Nelishia (MDPI, 2022-11-29)
    Deep neural networks have proven to be effective in various domains, especially in natural language processing and image processing. However, one of the challenges associated with using deep neural networks includes the ...
  • Modupe, Abiodun; Celik, Turgay; Marivate, Vukosi; Olugbara, Oludayo O. (MDPI, 2022-07-26)
    Post-authorship attribution is a scientific process of using stylometric features to identify the genuine writer of an online text snippet such as an email, blog, forum post, or chat log. It has useful applications in ...
  • Ledwaba, Mashadi; Marivate, Vukosi (Association for Computing Machinery (ACM), 2022-06)
    This study aims to understand the South African political context by analysing the sentiments shared on Twitter during the local government elections. An emphasis on the analysis was placed on understanding the discussions ...
  • Ramazhamba, Pardon Takalani (University of Pretoria, 2023-01-30)
    The tendering system used by the South African Government is regarded as a central method used by the organs of state to procure goods and services, including delivering some services to citizens with the aim of promoting ...
  • Van der Merwe, Barend Jacobus; Pillay, Nelishia; Coetzee, Serena Martha (Elsevier, 2022-06)
    Barchan morphometric data have been used as proxies of meteorological and topographical data in environments where this data is lacking (such as other planetary bodies), gaining insights into barchan dune field dynamics ...
  • Kuranga, Cry; Ranganai, Njodzi; Muwani, Tendai S. (Springer, 2022-12)
    Real-world nonstationary data are usually characterized by high nonlinearity and complex patterns due to the effects of different exogenous factors that make prediction a very challenging task. An ensemble strategically ...
  • Kraemer, Moritz U.G.; Scarpino, Samuel V.; Marivate, Vukosi; Gutierrez, Bernardo; Xu, Bo; Lee, Graham; Hawkins, Jared B.; Rivers, Caitlin; Pigott, David M.; Katz, Rebecca; Brownstein, John S. (Nature Research, 2021-01)
    Detailed, accurate data related to a disease outbreak enable informed public health decision making. Given the variety of data types available across different regions, global data curation and standardization efforts are ...
  • O’Reilly, Jared; Pillay, Nelishia (Springer, 2022-07)
    Research efforts in the improvement of artificial neural networks have provided significant enhancements in learning ability, either through manual improvement by researchers or through automated design by other artificial ...
  • Singh, Avinash; Ikuesan, Richard Adeyemi; Venter, H.S. (Hein) (Institute of Electrical and Electronics Engineers, 2022-02)
    Securing digital evidence is a key factor that contributes to evidence admissibility during digital forensic investigations, particularly in establishing the chain of custody of digital evidence. However, not enough is ...
  • Mbona, Innocent; Eloff, Jan H.P. (Institute of Electrical and Electronics Engineers, 2022-06-29)
    Recently, network intrusion attacks, particularly new unknown attacks referred to as zero-day attacks, have become a global phenomenon. Zero-day network intrusion attacks constitute a frequent cybersecurity threat, as they ...
  • Mokoatle, Mpho; Mapiye, Darlington; Marivate, Vukosi; Hayes, Vanessa M.; Bornman, Maria S. (Riana) (Public Library of Science, 2022-06-09)
    One of the most precise methods to detect prostate cancer is by evaluation of a stained biopsy by a pathologist under a microscope. Regions of the tissue are assessed and graded according to the observed histological ...
  • Craze, Hamish A.; Pillay, Nelishia; Joubert, Fourie; Berger, David Kenneth (MDPI, 2022-07-26)
    Maize yields worldwide are limited by foliar diseases that could be fungal, oomycete, bacterial, or viral in origin. Correct disease identification is critical for farmers to apply the correct control measures, such as ...
  • Makura, Sheunesu M.; Venter, H.S. (Hein); Kebande, Victor Rigworo; Karie, Nickson M; Ikuesan, Richard A; Alawadi, Sadi (Wiley, 2021-05)
    An increase in the use of cloud computing technologies by organizations has led to cybercriminals targeting cloud environments to orchestrate malicious attacks. Conversely, this has led to the need for proactive approaches ...
  • Lutu, P.E.N. (Patricia Elizabeth Nalwoga) (Newswood Limited, 2021-07)
    Recommender systems are commonly used for Internet-based activities to assist users in making decisions on what items to select. One very common use of recommender systems is in electronic commerce purchases. The need for ...
  • Baror, S.O. (Stacey); Venter, H.S. (Hein); Kebande, Victor Rigworo (Springer, 2022-03)
    COVID-19 scourge has made it challenging to combat digital crimes due to the complexity of attributing potential security incidents to perpetrators. Existing literature does not accurately pinpoint relevant models/frameworks ...
  • Fagbola, Funmilola Ikeolu; Venter, H.S. (Hein) (MDPI, 2022-01)
    Internet of Things (IoT) is the network of physical objects for communication and data sharing. However, these devices can become shadow IoT devices when they connect to an existing network without the knowledge of the ...
  • Hassan, Ahmed; Pillay, Nelishia (Springer, 2021-11)
    Selection hyper-heuristics have proven to be effective in solving various real-world problems. Hyper-heuristics differ from traditional heuristic approaches in that they explore a heuristic space rather than a solution ...
  • Dlamini, Moses Thandokuhle; Eloff, Jan H.P.; Venter, H.S. (Hein); Eloff, Mariki M. (Wiley, 2022-01)
    For businesses to benefit from the many opportunities of cloud computing, they must first address a number of security challenges, such as the potential leakage of confidential data to unintended third parties. An inter-VM ...