Browsing School of Computer Science and Informatics by Title
Now showing items 283-302 of 2977
-
A baseline study of a Dwesa rural community for the Siyakhula Information and Communication Technology for Development project: understanding the reality on the ground
(Article)necessary foundation for implementing Information and Communication Technology for Development (ICT4D) projects is an understanding of the existing status of a rural community, in terms of its socio-economic status and its ... -
A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection
(Article)The broadcast nature of Wireless Local Area Networks (WLANs) has made them prone to several types of wireless injection attacks, such as Man-in-the-Middle (MitM) at the physical layer, deauthentication and rogue access ... -
A Bayesian approach to portfolios selection in multicriteria group decision making
(Article)In the a-posteriori approach to multicriteria decision making the idea is to first find a set of interesting (usually non-dominated) decision alternatives and then let the decision maker select among these. Often an ... -
Bayesian Estimation of A Periodically-Releasing Biochemical Source Using Sensor Networks
(Conference)This paper develops a Bayesian estimation method to estimate source parameters of a biochemical source using a network of sensors. Based on existing models of continuous and instantaneous releases, a model of discrete and ... -
Behavior-Based Outlier Detection for Network Access Control Systems
(Conference)Network Access Control (NAC) systems manage the access of new devices into enterprise networks to prevent unauthorised devices from attacking network services. The main difficulty with this approach is that NAC cannot ... -
A Behaviour Profiling Based Technique for Network Access Control Systems
(Article)The emergence of the Internet of Things (IoT) has lead to a tech- nological transformation that integrates several technologies to represent the future of computing and communications. IoT is the interconnection of internet ... -
Behavioural API based Virus Analysis and Detection
(Article)The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures ... -
Benchmark Functions for the CEC'2017 Competition on Many-Objective Optimization
(Technical Report)In the real world, it is not uncommon to face an optimization problem with more than three objectives. Such problems, called many-objective optimization problems (MaOPs), pose great challenges to the area of evolutionary ... -
Benchmark Functions for the CEC'2018 Competition on Many-Objective Optimization
(Technical Report) -
Benchmark generator for CEC 2009 competition on dynamic optimization
(Technical Report)