Research 2005

Department Home

Researchers

Guest Researchers

Research Interests

Research Output

Postgraduate Student Projects 2005

Research Findings

Funded Projects

Back To

Output

 

Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science
Papers in refereed, published conference proceedings

Publication Title

Instructions

Select the first letter of the publication title from the alphabetical list.

 
A  E  F  I  P  R  S  T 

A

Olivier MS: 2005. Forensics and Privacy-Enhancing Technologies. In Advances in digital forensics: IFIP International Conference on Digital Forensics, Springer, pp 17-31.

Laubscher R, Rabe D, Olivier MS, Eloff JHP, Venter HS: 2005. Applying Forensic Principles to Computer-Based Assessment. In Advances in digital forensics: IFIP International Conference on Digital Forensics, Springer, pp 105-112.

Fei K, Eloff JHP, Venter HS, Olivier MS: 2005. Exploring Forensic Data with Self-Organizing Maps. In Advances in digital forensics: IFIP International Conference on Digital Forensics, Springer, pp 113-123.

Back to Top

E

Renaud K, Bishop JM, Lo LCJ, Worrall BG: 2005. Algon: From Interchangeable Distributed Algorithms to Interchangeable Middleware. In Electronic Notes in Theoretical Science: Proceedings of the Software Composition Workshop (SC 2004), Elsevier, pp 65-85.

Back to Top

F

Omran MGH, Engelbrecht AP, Salman A: 2005. Dynamic Clustering using Particle Swarm Optimization with Application in Unsupervised Image Classification. In Fifth World Enformatika Conference.

Back to Top

I

Papacostantis E, Engelbrecht AP, Franken CJ: 2005. Coevolving Probabilistic Game Playing Agents Using Particle Swarm Optimization Algorithms. In IEEE 2005 Symposium on Computational Intelligence and Games (CIG 05), pp 195-202.

Omran MGH, Engelbrecht AP, Salman A: 2005. Self-Adaptive Differential Evolution. In International Conference on Computational Intelligence and Security, pp 192-199.

Omran MGH, Engelbrecht AP, Salman A: 2005. Using Neighborhood Topologies with Differential Evolution. In International Conference on Computational Intelligence and Security.

Back to Top

P

Morkel T, Olivier MS, Eloff JHP, Venter HS: 2005. One-Time Passwords in a Mobile Environment using Steganography. In Proceedings of the 1st International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, Diavlos Publications, pp 13-19.

Croft NJ, Olivier MS, Venter HS: 2005. Codec-Hopping: Secure and Private Voice Communication in Bandwidth Constrained Networks. In Proceedings of the 1st International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, Diavlos Publications, pp 85-91.

Peer ES, Engelbrecht AP, Pampara G, Masiye BS: 2005. CICLOPS: Computational Intelligence Collaborative Laboratory of Pantological Software. In Proceedings of the 2005 IEEE Swarm Intelligence Symposium, IEEE, pp 130-137.

Engelbrecht AP, Masiye BS, Pampara G: 2005. Niching Ability of Basic Particle Swarm Optimization Algorithms. In Proceedings of the 2005 IEEE Swarm Intelligence Symposium, IEEE, pp 397-400.

Slaviero ML, Olivier MS: 2005. Choosing a Deterministic function for use with DAOMAP, the Distributed Allocation Of Multicast Addresses Protocol. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 105-112.

Croft NJ, Olivier MS: 2005. Using compatible keys in achieving subscriber privacy channelling for billing in GSM Networks. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 245-252.

Tillwick H, Neumann T, Olivier MS, Venter HS, Eloff JHP: 2005. Polar: Proxies collaborating to achieve anonymous web browsing. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 317-324.

Venter HS, Olivier MS, Eloff JHP, Botes ME: 2005. Balancing patient privacy and treatment facility accountability using a centralised pseudonymous HIV/AIDS database. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 377-384.

Coetzee M, Eloff JHP: 2005. Autonomous Trust for Web Services. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 217-225.

Smith E, Eloff JHP: 2005. A new perspective on Risk Assessment Techniques. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 227-234.

Loock M, Eloff JHP: 2005. Investigating the usage of the Chinese Wall Security Policy model for Data Mining. In Proceedings of the Fourth International Symposium on Information and Communication Technologies, Computer Science Press, pp 243-248.

Schoeman IL, Engelbrecht AP: 2005. A Parallel Vector-Based Particle Swarm Optimizer. In Proceedings of the International Conference on Adaptive and Natural Computing Algorithms, Springer: Wien, NewYork, pp 268-271.

Oberholzer HJG, Olivier MS: 2005. Privacy Contracts as an Extension of Privacy Policies. In Proceedings of the International Workshop on Privacy Data Management (PDM 2005), IEEE, pp 11-19.

Coetzee M, Eloff JHP: 2005. Metadata for trust in service-oriented architectures. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-11 (CD).

Izadinia VD, Kourie DG, Eloff JHP: 2005. Foiling an Attack - Defeating IPSec Tunnel Fingerprinting. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-14 (CD).

Loock M, Eloff JHP: 2005. A new Access Control model based on the Chinese Wall Security Policy Model. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-10 (CD).

Morkel T, Eloff JHP, Olivier MS: 2005. An overview of image steganography. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-11 (CD).

Slaviero ML, Kroon J, Olivier MS: 2005. Attacking Signed Binaries. In Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp 1-10 (CD).

Ketcha Ngassam E, Kourie DG, Watson BW: 2005. Reordering Finite Automata States for Fast String Recognition. In Proceedings of the Prague Stringology Conference '05, Czech Technical University, pp 69-80.

Fick D, Kourie DG, Watson BW: 2005. A Virtual Machine Framework for Domain Specific Languages. In Proceedings of the Third International Conference on .NET Technologies, UNION Agency, pp 195-200.

Bishop JM, Worrall BG: 2005. Towards platform independence; retargeting GUI libraries on .Net. In Proceedings of the Third International Conference on .NET Technologies, UNION Agency, pp 23-33.

Back to Top

R

Olivier MS: 2005. Distributed Proxies for Browsing Privacy - A Simulation of Flocks. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 104-112.

Tillwick H, Olivier MS: 2005. Towards a Framework for Connection Anonymity. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 113-122.

Laubscher R, Olivier MS, Venter HS, Eloff JHP, Rabe DJ: 2005. The Role of Key Loggers in Computer-based Assessment Forensics. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 123-130.

Strauss MD, Kourie DG, Olivier MS: 2005. A Simulation Study of Traffic Conditioner Performance. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 171-181.

Cleophas LG, Watson BW, Kourie DG, Boake A: 2005. TABASCO: a Taxonomy-based Domain Engineering Method. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 38-47.

Strauss MD, Kourie DG: 2005. A Simulation Study of Traffic Conditioner Performance. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 171-181.

Grobler J, Kourie DG: 2005. Design of a High Resolution Soft Real-Time Timer under a Win32 Operating. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 226-235.

Van Kempen M, Chaudron M, Kourie DG, Boake A: 2005. Towards Proving Preservation of Behaviour of Refactoring of UML Models. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 252-259.

Theunissen WHM, Boake A, Kourie DG: 2005. In Search of the Sweet Spot: Agile Open Collaborative Corporate Software Development. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 268-277.

Subotic S, Bishop JM: 2005. Emergent Behaviour of Aspects in High Performance and Distributed Computing. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 11-19.

Berg K, Bishop JM: 2005. Tracing Software Product Line Variability - From Problem to Solution Space. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 182-191.

Tsoaeli T, Bishop JM: 2005. Enhancing Adaptability of Distributed Groupware Applications. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 260-267.

Schoeman IL, Engelbrecht AP: 2005. Containing Particles inside Niches when Optimizing Multimodal Functions. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 78-85.

Grant TJ: 2005. Unifying Planning and Control using an OODA-based Architecture. In Research for a Changing World - Proceedings of SAICSIT 2005, SAICSIT, pp 159-170.

Back to Top

S

Croft NJ, Olivier MS: 2005. Using an approximated One-Time Pad to Secure Short Messaging Service (SMS). In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 71-76.

Delport JP, Olivier MS: 2005. Detecting Uncooperative Ethernet Elements using Accurate Round-trip Time Measurements. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 153-156.

Wojcik M, Venter HS, Eloff JHP, Olivier MS: 2005. Incorporating Prejudice into Trust Models to Reduce Network Overload. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 195-200.

Bihina Bella MA, Olivier MS, Eloff JHP: 2005. A fraud detection model for Next-Generation Networks. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 321-326.

Neumann T, Olivier MS: 2005. Enhancements to SIP to prevent abuse of Voice-over-IP services. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 359-363.

Rossudowski AM, Venter HS: 2005. The use of smart cards to perform ATM transactions in an off-line environment. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 427-432.

Tshivhase FE, Venter HS, Eloff JHP: 2005. Implementing Application and Network Security using Aspect-oriented Programming. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 471-475.

Oyomno W, Venter HS: 2005. Link Layer Type-Tagging in Fixed-Phrase Speaker Verification Systems. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 493-499.

Theunissen WHM, Boake A, Kourie DG: 2005. Software Development in the Converging Telecommunications World. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 465-470.

Edwards AI, Engelbrecht AP: 2005. Nonlinear Mapping using Particle Swarm Optimisation in Security based Applications. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 1-6 (CD).

Back to Top

T

Edwards AI, Engelbrecht AP, Franken CJ: 2005. Nonlinear Mapping using Particle Swarm Optimisation. In The 2005 IEEE Congress on Evolutionary Computation (CEC 2005), IEEE, pp 1-8 (CD).

Omran MGH, Engelbrecht AP, Salman A: 2005. Differential Evolution Methods for Unsupervised Image Classification. In The 2005 IEEE Congress on Evolutionary Computation (CEC 2005), IEEE, pp 1-8 (CD).

Pampara G, Franken CJ, Engelbrecht AP: 2005. Combining Particle Swarm Optimisation with angle modulation to solve binary problems. In The 2005 IEEE Congress on Evolutionary Computation (CEC 2005), IEEE, pp 1-8 (CD).

Franken CJ, Engelbrecht AP: 2005. Investigating Binary PSO Parameter Influence on the Knight Cover Problem. In The 2005 IEEE Congress on Evolutionary Computation (CEC 2005), IEEE.

Grant TJ: 2005. Integrating Sensemaking and Response using Planning Operator Induction. In The Second International Conference on Information Systems for Crises Response and Management (ISCRAM 2005) Proceedings, ISCRAM, pp 89-96.

Back to Top