Research 2010

Department Home

Researchers

Guest Researchers

Research Interests

Research Output

Postgraduate Student Projects 2010

Research Findings

Funded Projects

Back To

Output

 

Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science
Papers in refereed, published conference proceedings

Publication Title

Instructions

Select the first letter of the publication title from the alphabetical list.

 
1  7  A  F  I  M  N  P  S  W 

1

Alexander PM, Pieterse V: 2010. Indications of Personality Trait Difference between ICT and Other Students. In 18th European Conference of Information Systems (ECIS 2010), ECIS, pp 1-12.

Back to Top

7

Brandi W, Olivier MS: 2010. In Search of Search Privacy. In 7th International Conference, TrustBus 2010, Springer, pp 102-116.

Back to Top

A

Ngobeni SJ, Venter HS, Burke I: 2010. A Forensic Readiness Model for Wireless Networks. In Advances in Digital Forensics VI Sixth IFIP WG 11.9 International Conference on Digital Forensics, Springer, pp 107-117.

Back to Top

F

Vural I, Venter HS: 2010. Mobile Botnet Detection Using Network Forensics. In Future Internet - FIS2010, Springer, pp 57-67.

Back to Top

I

Reddy K, Venter HS: 2010. Information Privacy in Two Dimensions - Towards a Classification Scheme for Information Privacy Research. In IEEE International Conference on Social Computing (SocialCom 2010) & IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2010), IEEE, pp 973-980.

Back to Top

M

Engelbrecht AP: 2010. Finding Multiple Solutions to Unconstrained Optimization Problems using Particle Swarm Optimization. In Mathematical and Computational Models: Recent Trends, Narosa, pp 299-311.

Back to Top

N

Nitschke G, Langenhoven LH: 2010. Neuro-Evolution for Competitive Co-evolution of Biologically Canonical Predator and Prey Behaviors. In NaBIC 2010: World Congress on Nature and Biologically Inspired Computing, IEEE, pp 553-560.

Back to Top

P

Reyneke P, Morrison N, Kourie DG, de Ridder C: 2010. Smoothing Irregular data using Polynomial Filters. In Proceedings ELMAR 2010, Croatian Society Electronics in Marine (ELMAR), pp 393-397.

Pieterse V, Kourie DG, Cleophas LG, Watson BW: 2010. Performance of C++ Bit-vector Implementations. In Proceedings of SAICSIT 2010, ACM, pp 242-250.

Marshall L, Kourie DG: 2010. Deriving a Digraph Isomorphism for Digraph Compliance Measurement. In Proceedings of SAICSIT 2010, ACM, pp 160-169.

Ketcha Ngassam E, Kourie DG, Watson BW: 2010. A framework for benchmarking FA-based String Recognizers. In Proceedings of SAICSIT 2010, ACM, pp 220-230.

Koschmider A, Hoyer V, Giessmann A: 2010. Quality Metrics for Mashups. In Proceedings of SAICSIT 2010, ACM, pp 376-380.

Burke I, Naidoo S, Olivier MS: 2010. Framework for Developing Realistic MANET Simulations. In Proceedings of the 5th International Conference on Information Warfare and Security, Academic Publishing Limited, pp 65-71.

Cooper A, Kourie DG, Coetzee SM: 2010. Thoughts on exploiting instability in lattices for assessing the discrimination adequacy of a taxonomy. In Proceedings of the 7th International Conference on Concept Lattices and their Applications (CLA 2010), University of Sevilla, pp 338-343.

Kotze DJJ, Olivier MS: 2010. Detecting XML Data Irregularities by Means of Lexical Analysis and Parsing. In Proceedings of the 9th European Conference on Information Warfare and Security, Academic Publishing Limited, pp 151-159.

Veerasamy N, Eloff JHP: 2010. Motivation and Requirements for Determinig a Network Warfare Capability. In Proceedings of the 9th European Conference on Information Warfare and Security, Academic Publishing Limited, pp 310-319.

Van Staden FR, Venter HS: 2010. Adding digital forensic readiness to the email trace header. In Proceedings of the ISSA 2010 Conference, IEEE, pp 1-4.

Bezuidenhout M, Mouton F, Venter HS: 2010. Social Engineering Attack Detection Model: SEADM. In Proceedings of the ISSA 2010 Conference, IEEE, pp 1-8.

Visage H, Olivier MS: 2010. A proposed model for explaining and educating Information and Computer Security principles. In Proceedings of the ISSA 2010 Conference, IEEE, pp 1-6.

Vural I, Venter HS: 2010. Using network forensics and artificial intelligence techniques to detect Bot-nets on an organizational network. In Proceedings of the Seventh International Conference on Information Technolgy (ITNG), IEEE / CPS, pp 725-731.

Reyneke P, Grobler P, Kourie DG, de Ridder C: 2010. Doing a bundle adjustment by using a linear system of equations. In Proceedings of the Twenty-First Annual Symposium of the Pattern Recognition Association of South Africa (PRASA), IEEE, pp 237-243.

Masombuka T, de Ridder C, Kourie DG: 2010. An investigation of software for minisatellite detection. In Proceedings of the Twenty-First Annual Symposium of the Pattern Recognition Association of South Africa (PRASA), IEEE, pp 171-177.

Back to Top

S

Pieterse V, Marshall L: 2010. What is a Design Pattern? Wrapping the student brain around it. In SACLA: Southern African Computer Lecturer's Association 2010, ACM, pp 1-8.

van Rooyen IJ, Pieterse V: 2010. Differences in educational value of formal and informal discussion forums. In SACLA: Southern African Computer Lecturer's Association 2010, ACM, pp 1-7.

Engelbrecht AP: 2010. Heterogeneous Particle Swarm Optimization. In Swarm Intelligence: 7th International Conference, ANTS 2010, Springer, pp 191-202.

Back to Top

W

Ludwig B, Coetzee SM: 2010. A Comparison of Platform as a Service (PAAS) clouds with a detailed reference to Security and Geoprocessing Services. In WebMGS 2010 1st International Workshop on Pervasive Web Mapping, Geoprocessing and Services, ISPRS, pp 2/ 1-6.

Back to Top