Search
Login
UPSpace Home
→
Engineering, Built Environment and Information Technology
→
Computer Science
→
Research Articles (Computer Science)
→
Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
Search
Filters
Use filters to refine the search results.
Current Filters:
Title
Author
Subject
Date issued
Has File(s)
Filename
File description
Contains
Equals
ID
Not Contains
Not Equals
Not ID
New Filters:
Title
Author
Subject
Date issued
Has File(s)
Filename
File description
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Showing 10 out of a total of 21 results for collection: Research Articles (Computer Science).
(0.017 seconds)
Now showing items 11-20 of 21
Previous Page
1
2
3
Next Page
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Using machine learning to detect fake identities : bots vs humans
Van der Walt, Estee
;
Eloff, Jan H.P.
(
Institute of Electrical and Electronics Engineers
,
2018
)
Cyber-security : identity deception detection on social media platforms
Van der Walt, Estee
;
Eloff, Jan H.P.
;
Grobler, Jacomine
(
Elsevier
,
2018-09
)
Feature selection using Benford’s law to support detection of malicious social media bots
Mbona, Innocent
;
Eloff, Jan H.P.
(
Elsevier
,
2022-01
)
Information security culture - validation of an assessment instrument
Da Veiga, A.
;
Martins, Nico
;
Eloff, Jan H.P.
(
College of Economic and Management Sciences, University of South Africa
,
2007-04
)
Evaluating usage control deterrents
Padayachee, Keshnee
;
Eloff, Jan H.P.
(
Computer Society of South Africa
,
2012-06
)
Web services access control architecture incorporating trust
Coetzee, Marijke
;
Eloff, Jan H.P.
(
Emerald
,
2007
)
Analysing drivers’ preferences for privacy enhancing car-to-car communication systems : a study from South-Africa
Islami, Lejla
;
Fischer-Hubner, Simone
;
Hammond, Eunice Naa Korkoi
;
Eloff, Jan H.P.
(
Springer
,
2021-04
)
Adapting usage control as a deterrent to address the inadequacies of access controls
Padayachee, Keshnee
;
Eloff, Jan H.P.
(
Elsevier
,
2009
)
A roadmap for rural area ICT solution deployment : a case of Kgautswane community in South Africa
Ngassam, Ernest Ketcha
;
Ntawanga, Felix
;
Eloff, Jan H.P.
(
International Center for Information Technology and Development
,
2013-04
)
The use of self-organising maps for anomalous behaviour detection in a digital investigation
Fei, B.K.L. (Bennie Kar Leung)
;
Eloff, Jan H.P.
;
Olivier, Martin S.
;
Venter, H.S. (Hein)
(
Elsevier
,
2006-10
)
Now showing items 11-20 of 21
Previous Page
1
2
3
Next Page
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Browse
All of UPSpace
Communities & Collections
Issue Date
Authors
Titles
Subjects
Supervisor
UP Author
UP Postgraduate
Type
This Collection
Issue Date
Authors
Titles
Subjects
Supervisor
UP Author
UP Postgraduate
Type
My Account
Login
Register
UPSpace Workspace
Discover
Author
Eloff, Jan H.P. (21)
Olivier, Martin S. (3)
Van der Walt, Estee (3)
Coetzee, Marijke (2)
Eloff, M.M. (2)
Padayachee, Keshnee (2)
Venter, H.S. (Hein) (2)
Bella, M.A. Bihina (1)
Bihina Bella, M.A. (Madeleine Adrienne) (1)
Bishop, Judith (1)
... View More
Subject
Big data (3)
Digital forensics (3)
Identity deception (3)
Social media (3)
Social media platform (SMP) (3)
Access control (2)
Bots (2)
Cyber-security (2)
Deterrent control (2)
Fake identities (2)
... View More
Date Issued
2020 - 2022 (3)
2010 - 2019 (9)
2005 - 2009 (9)
Has File(s)
true (21)