Search
Login
UPSpace Home
→
Engineering, Built Environment and Information Technology
→
Computer Science
→
Research Articles (Computer Science)
→
Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
Search
Filters
Use filters to refine the search results.
Current Filters:
Title
Author
Subject
Date issued
Has File(s)
Filename
File description
Contains
Equals
ID
Not Contains
Not Equals
Not ID
New Filters:
Title
Author
Subject
Date issued
Has File(s)
Filename
File description
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Showing 10 out of a total of 23 results for collection: Research Articles (Computer Science).
(0.008 seconds)
Now showing items 1-10 of 23
1
2
3
Next Page
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
What is an address in South Africa?
Coetzee, Serena Martha
;
Cooper, Antony Kyle
(
AOSIS Open Journals
,
2007-11
)
Web services access control architecture incorporating trust
Coetzee, Marijke
;
Eloff, Jan H.P.
(
Emerald
,
2007
)
Uncovering identities: a study into VPN tunnel fingerprinting
Izadinia, Vafa Dario
;
Kourie, Derrick G.
;
Eloff, Jan H.P.
(
Elsevier
,
2006
)
Towards a philosophy of software development : 40 years after the birth of software engineering
Northover, Mandy
;
Kourie, Derrick G.
;
Boake, Andrew B.
;
Gruner, Stefan
;
Northover, Alan
(
Springer
,
2008-08
)
The use of self-organising maps for anomalous behaviour detection in a digital investigation
Fei, B.K.L. (Bennie Kar Leung)
;
Eloff, Jan H.P.
;
Olivier, Martin S.
;
Venter, H.S. (Hein)
(
Elsevier
,
2006-10
)
Team trails, trials and tribulations - rigorously reckoning with requirements
Pieterse, Vreda
;
Du Toit, Cecilia Magdalena
(
Unisa Press
,
2008
)
SMSSec : an end-to-end protocol for secure SMS
Lo, Johnny Li-Chang
;
Bishop, Judith
;
Eloff, Jan H.P.
(
Elsevier
,
2008-10
)
Sensitivity analysis of voronoi-based sensor deployment and reconfiguration algorithms
Nicholls, Gareth
;
Kourie, Derrick G.
;
Strauss, Tinus
(
Computer Society of South Africa
,
2009-07
)
Letter to the editor : 40 years after Garmisch
Gruner, Stefan
(
Computer Society of South Africa
,
2008-06
)
Information security culture - validation of an assessment instrument
Da Veiga, A.
;
Martins, Nico
;
Eloff, Jan H.P.
(
College of Economic and Management Sciences, University of South Africa
,
2007-04
)
Now showing items 1-10 of 23
1
2
3
Next Page
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Browse
All of UPSpace
Communities & Collections
Issue Date
Authors
Titles
Subjects
Supervisor
UP Author
UP Postgraduate
Type
This Collection
Issue Date
Authors
Titles
Subjects
Supervisor
UP Author
UP Postgraduate
Type
My Account
Login
Register
UPSpace Workspace
Discover
Author
Eloff, Jan H.P. (9)
Gruner, Stefan (7)
Kourie, Derrick G. (4)
Olivier, Martin S. (3)
Bishop, Judith (2)
Coetzee, Marijke (2)
Coetzee, Serena Martha (2)
Strauss, Tinus (2)
Bauderon, Michel (1)
Bihina Bella, M.A. (Madeleine Adrienne) (1)
... View More
Subject
Algorithms (2)
Information security (2)
Software engineering (2)
Trust (2)
Worldwide web (2)
Academic maturity (1)
Access control (1)
Address (1)
Address data (1)
Admission requirements (1)
... View More
Date Issued
2008 (8)
2009 (6)
2007 (4)
2006 (2)
2000 (1)
2001 (1)
2005 (1)
Has File(s)
true (23)