Browsing Research Articles (Computer Science) by Title

Browsing Research Articles (Computer Science) by Title

Sort by: Order: Results:

  • Izadinia, Vafa Dario; Kourie, Derrick G.; Eloff, Jan H.P. (Elsevier, 2006)
    Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its responses to targeted probes, or by listening on a ...
  • Munkhondya, Howard; Ikuesan, Richard Adeyemi; Singh, Avinash; Venter, H.S. (Hein) (Elsevier, 2023)
    Software-Defined Networking (SDN) is an evolutionary networking paradigm that offers simplified and agile network configuration and management capabilities. However, embracing this new and futuristic paradigm requires the ...
  • Louis, A.L.; Engelbrecht, Andries P. (Elsevier, 2011-04)
    This paper addresses the problem of analysing textual data for evidence discovery.A novel framework in which to perform evidence discovery is proposed in order to reduce the quantity of data to be analysed, aid the analysts’ ...
  • Solms, Fritz; Loubser, Dawid (Springer, 2010-01)
    The Use Case, Responsibility Driven Analysis and Design (URDAD) methodology is a methodology for technology neutral design generating the Platform Independent Model of the Object Management Group’s Model Driven Architecture. ...
  • Marivate, Vukosi; Combrink, Herkulaas MvE (Committee on Data for Science and Technology (CODATA), 2020-05)
    The coronavirus disease (COVID-19), caused by the SARS-CoV-2 virus, was declared a pandemic by the World Health Organization (WHO) in February 2020. Currently, there are no vaccines or treatments that have been approved ...
  • Fei, B.K.L. (Bennie Kar Leung); Eloff, Jan H.P.; Olivier, Martin S.; Venter, H.S. (Hein) (Elsevier, 2006-10)
    The dramatic increase in crime relating to the Internet and computers has caused a growing need for digital forensics. Digital forensic tools have been developed to assist investigators in conducting a proper investigation ...
  • Kroeze, Christina J.; Malan, Katherine Mary (Computer Society of South Africa, 2016-12-09)
    Mobile devices such as smartphones have until now been protected by traditional authentication methods, including passwords or pattern locks. These authentication mechanisms are difficult to remember and are often disabled, ...
  • Du Plessis, M.C. (Mathys Cornelius); Engelbrecht, Andries P. (Elsevier, 2012-04)
    This paper proposes two adaptations to DynDE, a differential evolution-based algorithm for solving dynamic optimization problems. The first adapted algorithm, Competitive Population Evaluation (CPE), is a multi-population ...
  • Olivier, Martin S.; Eloff, Jan H.P.; Venter, H.S. (Hein); Botes, Mariette E. (Computer Society of South Africa, 2011-07)
    Donor funds are available for treatment of many diseases such as HIV. However, privacy constraints make it hard for donor organisations to verify that they have not sponsored the same patient twice | or sponsored a patient ...
  • Van der Walt, Estee; Eloff, Jan H.P. (Institute of Electrical and Electronics Engineers, 2018)
    There is a growing number of people who hold accounts on social media platforms (SMPs) but hide their identity for malicious purposes. Unfortunately, very little research has been done to date to detect fake identities ...
  • Graaff, A.J. (Alexander Jakobus); Engelbrecht, Andries P. (Elsevier, 2011-03)
    Many of the existing network theory based artificial immune systems have been applied to data clustering. The formation of artificial lymphocyte (ALC) networks represents potential clusters in the data. Although these ...
  • Reddy, Kamil; Olivier, Martin S.; Venter, H.S. (Hein) (Springer, 2012-12)
    A digital forensic readiness (DFR) programme consists of a number of activities that should be chosen and managed with respect to cost constraints and risk. Traditional cost systems, however, can not provide the cost of ...
  • Gruner, Stefan; Kurt, Murat; Taentzer, Gabriele (Carleton Scientific, 2000)
    Sophisticated control concepts are necessary to make the application of graph grammars feasible for practical graph grammar engineering and specification tasks. For this purpose we introduce hybrid control graphs based on ...
  • Bosman, Anna Sergeevna; Engelbrecht, Andries; Helbig, Marde (Elsevier, 2020-08)
    Quantification of the stationary points and the associated basins of attraction of neural network loss surfaces is an important step towards a better understanding of neural network loss surfaces at large. This work proposes ...
  • Cleophas, L.G.W.A. (Loek); Kourie, Derrick G.; Watson, Bruce William (Computer Society of South Africa, 2014-08)
    In indexing of, and pattern matching on, DNA and text sequences, it is often important to represent all factors of a sequence. One e cient, compact representation is the factor oracle (FO). At the same time, any classical ...
  • Coetzee, Marijke; Eloff, Jan H.P. (Emerald, 2007)
    PURPOSE – This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services provider in conjunction with the attributes of users. DESIGN/METHODOLOGY/APPROACH – A ...
  • Ernsberger, Dominik; Adeyemi, Ikuesan Richard; Venter, H.S. (Hein); Zugenmaier, Alf (Springer, 2018-01)
    The Integration of mouse dynamics in user authentication and authorization has gained wider research attention in the security domain, specifically for user identification. However, same cannot be said for user identification ...
  • Coetzee, Serena Martha; Cooper, Antony Kyle; Adam, John B. (AOSIS Open Journals, 2007-11)
    Addresses come in many forms as they have a variety of uses. In our paper we illustrate the need for standardized addresses in South Africa by describing scenarios where standardized addresses are required, or where ...
  • Pieterse, Vreda; Van Eekelen, Marko (Springer, 2016-10)
    This paper describes some technical and employability skills that are essential for our students to succeed in a career in software development. We conducted research aimed at understanding the students' problems when ...
  • Mokoena, Tshepiso; Celik, Turgay; Marivate, Vukosi (Elsevier, 2022-01)
    In most applications, anomaly detection operates in an unsupervised mode by looking for outliers hoping that they are anomalies. Unfortunately, most anomaly detectors do not come with explanations about which features make ...