Page 36 - University of Pretoria RESEARCH OUTPUTS 2016
P. 36

FACULTY OF ENGINEERING, BUILT ENVIRONMENT AND INFORMATION TECHNOLOGY
(CONTINUED)
SCHOOL OF INFORMATION TECHNOLOGY COMPUTER SCIENCE
JOURNAL ARTICLES
Adeyemi IR, Razak S, Salleh M, and Venter HS. 2016. Observing Consistency in Online Communication Patterns for User Re- Identi cation. In PLoS One, 11(12), pp 1-27.
Cleophas L, Kourie D, Pieterse V, Schaefer I, and Watson B. 2016. Correctness-by-Construction ^ Taxonomies = Deep Comprehension of Algorithm Families. In Lecture Notes in Computer Science, 9952, pp 766-783.
Doman D, Helbig M, and Engelbrecht AP. 2016. Heterogeneous vector-evaluated particle swarm optimization in static environments. In Lecture Notes in Computer Science, 9712, pp 293-304.
Engelbrecht AP. 2016. Particle swarm optimization with crossover: a review and empirical analysis. In Arti cial Intelligence Review, 45, pp 131-165.
Grobler J, and Engelbrecht AP. 2016. Hyper-heuristics for the  exible job shop scheduling problem with additional constraints. In Lecture Notes in Computer Science, 9713, pp 3-10.
Grobler J, and Engelbrecht AP. 2016. Headless chicken particle swarm optimization algorithms. In Lecture Notes in Computer Science, 9712, pp 350-357.
Haskins B, and Pieterse V. 2016. Lessons learnt in applying automated code plagiarism detecting in an introductory programming module. In The Independent journal of teaching and learning, 11, pp 69-81.
Kroeze CJ, and Malan K. 2016. User authentication based on continuous touch biometrics. In South African Computer Journal, 28(2), pp 1-24. http://hdl.handle.net/2263/58658.
Marshall L, and Elo  JHP. 2016. Towards an Interdisciplinary Master’s Degree Programme in Big Data and Data Science: A South African Perspective. In Communications in Computer and Information Science, 1(642), pp 131-139.
Marshall L, Pieterse V, Thompson JE, and Venter D. 2016. Exploration of participation in student software engineering teams. In ACM Transactions on Computing Education, 16(2), pp 1-38.
Mohiuddin MA, Khan SA, and Engelbrecht AP. 2016. Fuzzy particle swarm optimization algorithms for the open shortest path  rst weight setting problem. In Applied Intelligence, 45, pp 598-621.
Mouton F, Leenen L, and Venter HS. 2016. Social Engineering attack examples, templates and scenarios. In Computers & Security, 59, pp 186-209. http://hdl.handle.net/2263/52151.
Olivier MS. 2016. On the Morality of Teaching Students IT Crime Skills. In Communications in Computer and Information Science, 642, pp 3-21.
Olivier MS. 2016. Digital forensic science: A manifesto. In South African Computer Journal, 28(2), pp 46-59.
Pieterse H, Olivier MS, and Van Heerden R. 2016. Reference Architecture for Android Applications to support the detection of manipulated evidence. In SAIEE Africa Research Journal (Transactions of the South African Insitute of Electrical Engineers), 107(2), pp 92-103.
Pieterse V, and Van Eekelen M. 2016. Which Are Harder? Soft Skills or Hard Skills? In Communications in Computer and Information Science, 1(642), pp 160-167.
34 | UP Research Outputs 2016


































































































   34   35   36   37   38