Recently added

Research Articles (Computer Science): Recent submissions

  • Cruz-Duarte, Jorge M.; Ortiz-Bayliss, Jose C.; Amaya, Ivan; Shi, Yong; Terashima-Marin, Hugo; Pillay, Nelishia (MDPI, 2020-11-17)
    Metaheuristics have become a widely used approach for solving a variety of practical problems. The literature is full of diverse metaheuristics based on outstanding ideas and with proven excellent capabilities. Nonetheless, ...
  • Kuranga, Cry; Pillay, Nelishia (Springer, 2021-09)
    Various machine learning techniques exist to perform regression on temporal data with concept drift occurring. However, there are numerous nonstationary environments where these techniques may fail to either track or detect ...
  • Takada, Shingo; Cuadros-Vargas, Ernesto; Impagliazzo, John; Gordon, Steven; Marshall, Linda; Topi, Heikki; Van der Veer, Gerrit; Waguespack, Leslie (Springer, 2020-09)
    Various computing subdisciplines, such as computer science and software engineering, each have their own curricular guidelines. They can be very difficult to understand and compare for people such as prospective students, ...
  • Ngejane, C.H. (Hombakazi); Eloff, Jan H.P.; Sefara, T.J.; Marivate, Vukosi (Elsevier, 2021-03)
    Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful behaviour for the attention of ...
  • Kebande, Victor Rigworo; Baror, Stacey Omeleze; Parizi, Reza M.; Choo, Kim-Kwang Raymond; Venter, H.S. (Hein) (Elsevier, 2020-12)
    A potential security incident may go unsolved if standardized forensic approaches are not applied during lawful investigations. This paper highlights the importance of mapping the digital forensic application requirement ...
  • Baror, Stacey Omeleze; Venter, H.S. (Hein); Adeyemi, Richard (Taylor and Francis, 2021)
    Currently, about half of all global enterprises are adopting and using some form of cloud computing services. In cloud computing, potential digital evidence is distributed across multiple isolated virtual machine instances. ...
  • Jordaan, Martina; Pieterse, Vreda (Higher Education South Africa, 2020-07)
    The article examines the value of using photovoice to assist reflection in a service learning module. Students were required to complete a reflective assignment in order to facilitate critical reflection on experiences ...
  • Marivate, Vukosi; Sefara, Tshephisho (Springer, 2020-08)
    We study the effect of different approaches to text augmentation. To do this we use three datasets that include social media and formal text in the form of news articles. Our goal is to provide insights for practitioners ...
  • Timm, Nils; Gruner, Stefan (Elsevier, 2019-04)
    We present a technique for verifying concurrent software systems via SAT-based three-valued bounded model checking. It is based on a direct transfer of the system to be analysed and a temporal logic property into a ...
  • Karie, Nickson M.; Kebande, Victor Rigworo; Venter, H.S. (Hein) (Elsevier, 2019)
    More than ever before, the world is nowadays experiencing increased cyber-attacks in all areas of our daily lives. This situation has made combating cybercrimes a daily struggle for both individuals and organisations. ...
  • Ismaila, Idris.; Legbo, Victor Y.; Ikuesan, Adeyemi Richard; Imavah, Shaka A.; Mohammad, Abdullahi B.; Abduldayan, Fatimah J.; Baba, Meshach. (Blue Eyes Intelligence Engineering and Sciences Publication, 2019-05)
    Technology-assisted living is a growing trend in most developing nations, particularly for young-aged demographic countries, as it presents a platform for personal development and knowledge management. However, this ...
  • Gruner, Stefan (Computer Society of South Africa, 2019-12)
    On the 5th of October 2019 I browsed the ACM-DL's database with the search key 'South Africa' in the 'conference location' field such as to obtain all ACM-DL-listed conference papers which were at any time presented in ...
  • Kebande, Victor Rigworo; Venter, H.S. (Hein) (NISC Pty (Ltd) and Informa Limited (trading as Taylor and Francis Group), 2019)
    The proliferation of cloud resources among organizations has had numerous benefits with regard to how business processes are conducted. However, despite the benefits, the cloud has not been very resilient due to how it is ...
  • Cleghorn, Christopher Wesley (Springer, 2019-03)
    This paper’s primary aim is to provide clarity on which guarantees about particle stability can actually be made. The particle swarm optimization algorithm has undergone a considerable amount of theoretical analysis. ...
  • Nicholls, Jason Frederick; Engelbrecht, Andries P. (Wiley, 2019-07)
    The profitability of trading rules evolved by three different optimised genetic programs, namely a single population genetic program (GP), a co‐operative co‐evolved GP, and a competitive co‐evolved GP is compared. Profitability ...
  • Pillay, Nelishia (Springer, 2020-06)
    Since its inception genetic programming, and later variations such as grammar-based genetic programming and grammatical evolution, have contributed to various domains such as classification, image processing, search-based ...
  • Ikuesan, Adeyemi Richard; Venter, H.S. (Hein) (Elsevier, 2019-09)
    The need for a reliable and complementary identifier mechanism in a digital forensic analysis is the focus of this study. Mouse dynamics have been applied in information security studies, particularly, continuous authentication ...
  • Pieterse, Heloise; Olivier, Martin S.; Van Heerden, Renier (Springer, 2019-01-25)
    Ever improving technology allows smartphones to become an integral part of people’s lives. The reliance on and ubiquitous use of smartphones render these devices rich sources of data. This data becomes increasingly important ...
  • Oldewage, Elre T.; Engelbrecht, Andries P.; Cleghorn, Christopher Wesley (Elsevier, 2020-02)
    Please read abstract in the article.
  • Van der Walt, Estee; Eloff, Jan H.P. (Emerald, 2019-09)
    PURPOSE : This paper aims to describe requirements for a model that can assist in identity deception detection (IDD) on social media platforms (SMPs). The model that was discovered demonstrates the usefulness of the ...