


default search action
South African Computer Journal, Volume 56
Volume 56, 2015
- Ralf C. Staudemeyer:

Applying long short-term memory recurrent neural networks to intrusion detection. - Patricia-Ann Harpur, Ruth de Villiers:

MUUX-E, a framework of criteria for evaluating the usability, user experience and educational features of m-learning environments. - Nelishia Pillay:

Intelligent System Design Using Hyper-Heuristics. - Kamisha Persad, Keshnee Padayachee:

The factors that influence customer e-services adoption. - Farouk Smith, Allan Edward van den Berg:

Hardware Genetic Algorithm Optimization by Critical Path Analysis using a Custom VLSI Architecture. - Alida Veldsman, Darelle van Greunen, Job Mashapa:

User-centered applications: Use of mobile information technologies to promote sustainable school healthcare services. - Keshnee Padayachee:

An Insider Threat Neutralization Mitigation Model Predicated On Cognitive Dissonance (ITNMCD). - Rikus le Roux, George van Schoor, Pieter van Vuuren:

Block RAM-based architecture for real-time reconfiguration using Xilinx® FPGAs. - Ralf C. Staudemeyer, James Connan:

Burning money with firewalls. - Rennie Naidoo, Alta van der Merwe, Aurona Gerber, Alan R. Hevner:

A social representations analysis of design science research. - Philip Machanick:

Editorial: Strong Growth.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














