Computer Science

Computer Science

Recent Submissions

  • Singh, Avinash; Ikuesan, A.R. (Adeyemi); Venter, H.S. (Hein) (Springer, 2019)
    Over the years there has been a significant increase in the exploitation of the security vulnerabilities of Windows operating systems, the most severe threat being malicious software (malware). Ransomware, a variant of ...
  • Pamparà, Gary; Engelbrecht, Andries P. (Springer, 2018-10)
    The quantum-inspired particle swarm optimization (QPSO) algorithm has been developed to find and track an optimum for dynamic optimization problems. Though QPSO has been shown to be effective, despite its simplicity, it ...
  • Oldewage, E.T. (Elre); Engelbrecht, Andries P.; Cleghorn, Christopher Wesley (Springer, 2018-10)
    This paper investigates the use of boundary constraint handling mechanisms to prevent unwanted particle roaming behaviour in high dimensional spaces. The paper tests a range of strategies on a benchmark for large scale ...
  • Oldewage, E.T. (Elre); Engelbrecht, Andries P.; Cleghorn, Christopher Wesley (Springer, 2018-10)
    This paper illustrates the importance of independent, component-wise stochastic scaling values, from both a theoretical and empirical perspective. It is shown that a swarm employing scalar stochasticity is unable to express ...
  • Cleghorn, Christopher Wesley; Scheepers, Christiaan; Engelbrecht, Andries P. (Springer, 2018-10)
    At present particle swarm optimizers (PSO) designed for multi-objective optimization have undergone no form of theoretical stability analysis. This paper derives the sufficient and necessary conditions for order-1 and ...
  • Harrison, Kyle Robert; Ombuki-Berman, Beatrice M.; Engelbrecht, Andries P. (Springer, 2018-10)
    This paper examines the position update equation of the particle swarm optimization (PSO) algorithm, leading to the proposal of a simplified position update based upon a Gaussian distribution. The proposed algorithm, ...
  • Rehman, S.; Ali, S.S.; Khan, Salman Ahmad (Taylor and Francis, 2018)
    Wind energy has emerged as a strong alternative to fossil fuels for power generation. To generate this energy, wind turbines are placed in a wind farm. The extraction of maximum energy from these wind farms requires optimal ...
  • Kebande, V.R. (Victor); Karie, Nickson M.; Venter, H.S. (Hein) (Indonesian Society for Knowledge and Human Development, 2018)
    The unique identities of remote sensing, monitoring, self-actuating, self–adapting and self-configuring “things” in Internet of Things (IoT) has come out as fundamental building blocks for the development of “smart ...
  • Kebande, V.R. (Victor); Karie, Nickson M.; Venter, H.S. (Hein) (Indonesian Society for Knowledge and Human Development, 2018)
    For every contact made on a digital device, a trace is left behind; this means that every digital device contains some form of electronic evidence that may be associated to the behaviour of the users in a given environment. ...
  • Van der Walt, Estee; Eloff, Jan H.P.; Grobler, Jacomine (Elsevier, 2018-09)
    Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in real-time, without any censorship. This freedom, however, comes at a cyber-security risk. Cyber threats are more difficult ...
  • Ernsberger, Dominik; Adeyemi, Ikuesan Richard; Venter, H.S. (Hein); Zugenmaier, Alf (Springer, 2018-01)
    The Integration of mouse dynamics in user authentication and authorization has gained wider research attention in the security domain, specifically for user identification. However, same cannot be said for user identification ...
  • Van Staden, Ruan Ruan (University of Pretoria, 2018)
    Email forensic investigations rely on the collection and analysis of digital forensic evidence collected from email systems. Problems arise when the digital forensic evidence needed for the email forensic investigation is ...
  • Trenwith, Philip Mauritz (University of Pretoria, 2018)
    The cloud has exacerbated the difficulty of digital forensic investigations because data may be spread over an ever-changing set of hosts and data centers. The normal search and seizure approach digital forensic investigators ...
  • Oldewage, Elre Talea (University of Pretoria, 2018)
    Particle swarm optimisation (PSO) is a stochastic, population-based optimisation algorithm. PSO has been applied successfully to a variety of domains. This thesis examines the behaviour of PSO when applied to high dimensional ...
  • Kebande, Victor Rigworo (University of Pretoria, 2018)
    The ubiquity of the cloud has accelerated an abundance of modern Information and Communication Technology (ICT)-based technologies to be built based on the cloud infrastructures. This has increased the number of internet ...
  • Gruner, Stefan (University of Wollongong (Australia), 2016-12)
    This paper recapitulates some of the most important thoughts and aspects of the early and almost forgotten computer- and informatics-philosophy by the Austrian computer pioneer Heinz Zemanek (1920-2014). From a practical ...
  • Gruner, Stefan; Kurt, Murat; Taentzer, Gabriele (Carleton Scientific, 2000)
    Sophisticated control concepts are necessary to make the application of graph grammars feasible for practical graph grammar engineering and specification tasks. For this purpose we introduce hybrid control graphs based on ...
  • Gruner, Stefan; Mosbah, Mohamed; Bauderon, Michel (2001)
    We present a tool for the visualization of distributed computations. Special attention is payed to certain distributed algorithms which have been coded as rewriting systems. In order to study the behaviour of algorithms ...
  • Timm, Nils; Gruner, Stefan (Department of Computer Science: University of Pretoria, 2018-08-01)
    In this Technical Report we provide the proof to Theorem 1 which appears in our forthcoming article "Three-Valued Bounded Model Checking with Cause-Guided Abstraction Refinement", to appear in the journal: Science of ...
  • Timm, Nils; Gruner, Stefan; CBSoft 2014 Brazilian Conference on Software : Theory and Practice (2014 : Maceio, Brazil) untranslated (2014)
    Three-valued abstraction is an established technique in software model checking. It proceeds by generating an abstract state space model over the values true, false and unknown, where the latter value is used to represent ...

View more