Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science
Research articles in refereed specialist journals
Journal Title
Grobler J, Engelbrecht AP, Kok S, Yadavalli VSS: 2009. Metaheuristics for the multi objective FJSP with sequence dependent setup times, auxiliary resources and machine down time. Annals of Operations Research, / Jan, p. Online, Full Text
Padayachee K, Eloff JHP: 2009. Adapting usage control as a deterrent to address the inadequacies of access controls. Computers & Security, 28 (7) / Oct, pp 536-544, Full Text
Dlamini MT, Eloff JHP, Eloff MM: 2009. Information security: The moving target. Computers & Security, (28) / Nov, pp 189-198, Full Text
Obiedkov S, Kourie DG, Eloff JHP: 2009. Building access control models with attribute exploration. Computers & Security, (28) / Jul, pp 2-7.
Olivier MS: 2009. On metadata context in Database Forensics. Digital Investigation, 5, pp 115-123.
Omran MGH, Engelbrecht AP, Salman A: 2009. Bare bones differential evolution. European Journal of Operational Research, 196 / Mar, pp 128-139, Full Text
Bihina Bella MA, Eloff JHP, Olivier MS: 2009. A fraud management system architecture for next-generation networks. Forensic Science International, 185 (1-3) / Mar, pp 51-58, Full Text
Khalid NK, Ibrahim Z, Kurniawan TB, Khalid M, Sarmin NH, Engelbrecht AP: 2009. Function minimization in DNA sequence design based on continuous particle swarm optimization. ICIC Express Letters, 3 (1) / Mar, pp 27-32.
Kourie DG, Fick D, Watson BW: 2009. Virtual machine framework for constructing domain-specific languages. IET Software, 3 (1), pp 1-13.
Coetser W, Kourie DG, Watson BW: 2009. On regular expression hashing to reduce FA size. International Journal of Foundations of Computer Science, 20 (6) / Mar, pp 1069-1086.
Schoeman IL, Engelbrecht AP: 2009. The Vector-based Particle Swarm Optimizer. Natural Computing, / Dec, pp 1-19.
Kourie DG, Obiedkov S, Watson BW, van der Merwe DW: 2009. An incremental algorithm to construct a lattice of set intersections. Science of Computer Programming, 74, pp 128-142.
Khan SA, Engelbrecht AP: 2009. Fuzzy hybrid simulated annealing algorithms for topology design of switched local area networks. Soft Computing, 13 (1) / Apr, pp 45-61.
Nicholls G, Kourie DG, Strauss MD: 2009. Sensitivity Analysis of Voronoi-based Sensor Deployment and Reconfiguration Algorithms. South African Computer Journal, 43 / Jul, pp 35-43, Full Text
|