Browsing Research Articles (Computer Science) by Title

Browsing Research Articles (Computer Science) by Title

Sort by: Order: Results:

  • Izadinia, Vafa Dario; Kourie, Derrick G.; Eloff, Jan H.P. (Elsevier, 2006)
    Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its responses to targeted probes, or by listening on a ...
  • Louis, A.L.; Engelbrecht, Andries P. (Elsevier, 2011-04)
    This paper addresses the problem of analysing textual data for evidence discovery.A novel framework in which to perform evidence discovery is proposed in order to reduce the quantity of data to be analysed, aid the analysts’ ...
  • Solms, Fritz; Loubser, Dawid (Springer, 2010-01)
    The Use Case, Responsibility Driven Analysis and Design (URDAD) methodology is a methodology for technology neutral design generating the Platform Independent Model of the Object Management Group’s Model Driven Architecture. ...
  • Fei, B.K.L. (Bennie Kar Leung); Eloff, Jan H.P.; Olivier, Martin S.; Venter, Hein S. (Elsevier, 2006-10)
    The dramatic increase in crime relating to the Internet and computers has caused a growing need for digital forensics. Digital forensic tools have been developed to assist investigators in conducting a proper investigation ...
  • Kroeze, Christina J.; Malan, Katherine Mary (Computer Society of South Africa, 2016-12-09)
    Mobile devices such as smartphones have until now been protected by traditional authentication methods, including passwords or pattern locks. These authentication mechanisms are difficult to remember and are often disabled, ...
  • Du Plessis, M.C. (Mathys Cornelius); Engelbrecht, Andries P. (Elsevier, 2012-04)
    This paper proposes two adaptations to DynDE, a differential evolution-based algorithm for solving dynamic optimization problems. The first adapted algorithm, Competitive Population Evaluation (CPE), is a multi-population ...
  • Olivier, Martin S.; Eloff, Jan H.P.; Venter, Hein S.; Botes, Mariette E. (Computer Society of South Africa, 2011-07)
    Donor funds are available for treatment of many diseases such as HIV. However, privacy constraints make it hard for donor organisations to verify that they have not sponsored the same patient twice | or sponsored a patient ...
  • Van der Walt, Estee; Eloff, Jan H.P. (Institute of Electrical and Electronics Engineers, 2018)
    There is a growing number of people who hold accounts on social media platforms (SMPs) but hide their identity for malicious purposes. Unfortunately, very little research has been done to date to detect fake identities ...
  • Graaff, A.J. (Alexander Jakobus); Engelbrecht, Andries P. (Elsevier, 2011-03)
    Many of the existing network theory based artificial immune systems have been applied to data clustering. The formation of artificial lymphocyte (ALC) networks represents potential clusters in the data. Although these ...
  • Reddy, Kamil; Olivier, Martin S.; Venter, Hein S. (Springer, 2012-12)
    A digital forensic readiness (DFR) programme consists of a number of activities that should be chosen and managed with respect to cost constraints and risk. Traditional cost systems, however, can not provide the cost of ...
  • Gruner, Stefan; Kurt, Murat; Taentzer, Gabriele (Carleton Scientific, 2000)
    Sophisticated control concepts are necessary to make the application of graph grammars feasible for practical graph grammar engineering and specification tasks. For this purpose we introduce hybrid control graphs based on ...
  • Cleophas, L.G.W.A. (Loek); Kourie, Derrick G.; Watson, Bruce William (Computer Society of South Africa, 2014-08)
    In indexing of, and pattern matching on, DNA and text sequences, it is often important to represent all factors of a sequence. One e cient, compact representation is the factor oracle (FO). At the same time, any classical ...
  • Coetzee, Marijke; Eloff, Jan H.P. (Emerald, 2007)
    PURPOSE – This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services provider in conjunction with the attributes of users. DESIGN/METHODOLOGY/APPROACH – A ...
  • Ernsberger, Dominik; Adeyemi, Ikuesan Richard; Venter, H.S. (Hein); Zugenmaier, Alf (Springer, 2018-01)
    The Integration of mouse dynamics in user authentication and authorization has gained wider research attention in the security domain, specifically for user identification. However, same cannot be said for user identification ...
  • Coetzee, Serena Martha; Cooper, A.K. (Antony Kyle); Adam, John B. (AOSIS Open Journals, 2007-11)
    Addresses come in many forms as they have a variety of uses. In our paper we illustrate the need for standardized addresses in South Africa by describing scenarios where standardized addresses are required, or where ...
  • Pieterse, Vreda; Van Eekelen, Marko (Springer, 2016-10)
    This paper describes some technical and employability skills that are essential for our students to succeed in a career in software development. We conducted research aimed at understanding the students' problems when ...
  • Rehman, S.; Ali, S.S.; Khan, Salman Ahmad (Taylor and Francis, 2018)
    Wind energy has emerged as a strong alternative to fossil fuels for power generation. To generate this energy, wind turbines are placed in a wind farm. The extraction of maximum energy from these wind farms requires optimal ...
  • Singh, Avinash; Venter, H.S. (Hein); Ikuesan, Adeyemi Richard (Taylor and Francis, 2018)
    The extraction of digital evidence from storage media is a growing concern in digital forensics, due to the time and space complexity in acquiring, preserving and analysing digital evidence. Microsoft Windows Registry is ...