Search
Login
UPSpace Home
→
Engineering, Built Environment and Information Technology
→
Computer Science
→
Research Articles (Computer Science)
→
Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
Search
Filters
Use filters to refine the search results.
Current Filters:
Title
Author
Subject
Date issued
Has File(s)
Filename
File description
Contains
Equals
ID
Not Contains
Not Equals
Not ID
New Filters:
Title
Author
Subject
Date issued
Has File(s)
Filename
File description
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Showing 10 out of a total of 23 results for collection: Research Articles (Computer Science).
(0.009 seconds)
Now showing items 11-20 of 23
Previous Page
1
2
3
Next Page
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Uncovering identities: a study into VPN tunnel fingerprinting
Izadinia, Vafa Dario
;
Kourie, Derrick G.
;
Eloff, Jan H.P.
(
Elsevier
,
2006
)
Towards a philosophy of software development : 40 years after the birth of software engineering
Northover, Mandy
;
Kourie, Derrick G.
;
Boake, Andrew B.
;
Gruner, Stefan
;
Northover, Alan
(
Springer
,
2008-08
)
Team trails, trials and tribulations - rigorously reckoning with requirements
Pieterse, Vreda
;
Du Toit, Cecilia Magdalena
(
Unisa Press
,
2008
)
How big is your IT department?
Gruner, Stefan
(
Computer Society of South Africa
,
2007-06
)
Letter to the editor : 40 years after Garmisch
Gruner, Stefan
(
Computer Society of South Africa
,
2008-06
)
Information security culture - validation of an assessment instrument
Da Veiga, A.
;
Martins, Nico
;
Eloff, Jan H.P.
(
College of Economic and Management Sciences, University of South Africa
,
2007-04
)
A comparison of simulated traffic conditioner performance
Strauss, Tinus
;
Kourie, Derrick G.
;
Olivier, Martin S.
(
Elsevier
,
2008-11
)
From use cases to test cases via meta model-based reasoning
Gruner, Stefan
(
Springer-Verlag
,
2008
)
Web services access control architecture incorporating trust
Coetzee, Marijke
;
Eloff, Jan H.P.
(
Emerald
,
2007
)
Sensitivity analysis of voronoi-based sensor deployment and reconfiguration algorithms
Nicholls, Gareth
;
Kourie, Derrick G.
;
Strauss, Tinus
(
Computer Society of South Africa
,
2009-07
)
Now showing items 11-20 of 23
Previous Page
1
2
3
Next Page
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Browse
All of UPSpace
Communities & Collections
Issue Date
Authors
Titles
Subjects
Supervisor
UP Author
UP Postgraduate
Type
This Collection
Issue Date
Authors
Titles
Subjects
Supervisor
UP Author
UP Postgraduate
Type
My Account
Login
Register
UPSpace Workspace
Discover
Author
Eloff, Jan H.P. (9)
Gruner, Stefan (7)
Kourie, Derrick G. (4)
Olivier, Martin S. (3)
Bishop, Judith (2)
Coetzee, Marijke (2)
Coetzee, Serena Martha (2)
Strauss, Tinus (2)
Bauderon, Michel (1)
Bihina Bella, M.A. (Madeleine Adrienne) (1)
... View More
Subject
Algorithms (2)
Information security (2)
Software engineering (2)
Trust (2)
Worldwide web (2)
Academic maturity (1)
Access control (1)
Address (1)
Address data (1)
Admission requirements (1)
... View More
Date Issued
2008 (8)
2009 (6)
2007 (4)
2006 (2)
2000 (1)
2001 (1)
2005 (1)
Has File(s)
true (23)