Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science
Research articles in refereed specialist journals
Venter HS, Eloff JHP: 2002. Vulnerabilities categories for intrusion detection systems. Computers and Security, 21 (7), pp 617-619.
Kourie DG, van der Merwe FJ: 2002. Compressed pseudo-lattices. Journal of Experimental and Theoretical Artificial Intelligence, 14 (2/3) / April-September, pp 229-254.
Watson BW: 2002. A Fast and Simple Algorithm for Constructing Minimal Acyclic Deterministic Finite Automata. Journal of Universal Computer Science, 8 (2) / February, pp 363-367.
Eloff JHP: 2002. What makes an Effective Information Security Policy?. Network Security, 2002 (6) / June, pp 14-16.
Engelbrecht AP, Brits R: 2002. Supervised Training using an Unsupervised Approach to Active Learning. Neural Processing Letters, 15 (3) / June, pp 247-260.
Watson BW: 2002. Directly Constructing Minimal DFAs: Combining Two Algorithms by Brzozowski. South African Computer Journal/Suid-Afrikaanse Rekenaartydskrif, (29) / December, pp 17-23.
Venter HS, Eloff JHP: 2002. Harmonising Vulnerability Categories. South African Computer Journal/Suid-Afrikaanse Rekenaartydskrif, (29) / December, pp 24-31.
Lategan FA, Olivier MS: 2002. PrivGuard: A Model to Protect Private Information Based on its Usage. South African Computer Journal/Suid-Afrikaanse Rekenaartydskrif, (29) / December, pp 58-68.
|