Abstract is missing.
- A unified cybersecurity framework for complex environmentsJabu Mtsweni, Noluxolo Gcaza, Mphahlele Thaba. 1-9 [doi]
- Toward distributed key management for offline authenticationGregory Linklater, Christian Smith, Alan Herbert, Barry Irwin. 10-19 [doi]
- The state complexity of language operations on XNFA-succinct unary regular languagesLaurette Marais, Lynette van Zijl. 20-28 [doi]
- Ant sorting based on cellular automata with clusteringRoxane Adams, Lynette van Zijl. 29-38 [doi]
- Extending the NFComms framework for bulk data transfersSean Pennefather, Karen Bradshaw, Barry Irwin. 39-48 [doi]
- A functional ontologyYusuf Moosa Motara, Karl Van der Schyff. 49-54 [doi]
- Crowdsensing for successful water resource monitoring: an analysis of citizens' intentions and motivationsC. Mloza-Banda, Brenda Scholtz. 55-64 [doi]
- Measuring verb similarity using binary coefficients with application to isiXhosa and isiZuluZola Mahlaza, C. Maria Keet. 65-71 [doi]
- Dropout algorithms for recurrent neural networksNathan Watt, Mathys C. du Plessis. 72-78 [doi]
- A network topology approach to bot classificationLaurenz A. Cornelissen, Richard J. Barnett, Petrus Schoonwinkel, Brent D. Eichstadt, Hluma B. Magodla. 79-88 [doi]
- Dynamic Bayesian decision network to represent growers' adaptive pre-harvest burning decisions in a sugarcane supply chainC. S. Price, Deshen Moodley, Anban W. Pillay. 89-98 [doi]
- Adoption of mobile enterprise applications in the insurance industryHenri Knoesen, Lisa F. Seymour. 99-107 [doi]
- Investigating the antecedents to teaching green information technology (Green IT): a survey of student teachers in SwazilandR. N. Dlamini, G. R. Howard. 108-117 [doi]
- Towards a taxonomy of subgraph isomorphism algorithmsPula Rammoko, Linda Marshall. 118-125 [doi]
- A critical analysis of informed use of context-aware technologiesAyodele A. Barrett, Machdel Matthee. 126-134 [doi]
- Towards an extended misuse case framework for elicitation of cloud dependability requirementsBabafemi Odusote, Olawande J. Daramola, Matthew Adigun. 135-144 [doi]
- A gap analysis of new smart city solutions for integrated city planning and managementL. Westraadt, André P. Calitz. 145-153 [doi]
- Competencies and skills of enterprise architects: a study in a South African telecommunications companyK. Mapingire, J. P. van Deventer, Alta van der Merwe. 154-163 [doi]
- Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN): a postmortem analysis of the memcached attack on the SANReNIvan Daniel Burke, Alan Herbert, Roderick Mooi. 164-170 [doi]
- How information and communication technologies empower disadvantaged communities in Cape Town, South AfricaL. Noruwana, W. Chigona, D. F. Malanga. 171-178 [doi]
- Deploying South African social honeypots on TwitterLaurenz A. Cornelissen, Richard J. Barnett, Morakane A. M. Kepa, Daniel Loebenberg-Novitzkas, Jacques Jordaan. 179-187 [doi]
- Rapid development of a command and control interface for smart office environmentsNdivhuwo Stan Ramunyisi, Jaco Badenhorst, Carmen Moors, Tebogo Gumede. 188-194 [doi]
- WeThinkCode_: case study of a tuition-free coding academyPeter John Alkema, Stephen Phillip Levitt, Ken J. Nixon. 195-204 [doi]
- Reading usability of ereaders and ebooks for information technology studentsTanya René Beelders, Jean-Pierre du Plessis. 205-214 [doi]
- A deep learning approach to photovoltaic cell defect classificationP. Banda, Lynette Barnard. 215-221 [doi]
- The role of accessibility and usability in bridging the digital divide for students with disabilities in an e-learning environmentM. J. Maboe, M. Eloff, M. Schoeman. 222-228 [doi]
- Evaluating a biosensor-based interface to recognize hand-finger gestures using a Myo armbandA. Saleh Zadeh, André P. Calitz, Jéan H. Greyling. 229-238 [doi]
- Re-ranking the search results for users with time-periodic intentsGina Horscroft, Jivashi Nagar, Hussein Suleman. 239-247 [doi]
- Agile system development methodologies usage and acceptance in South African banking firms: an exploratory analysisGrace Mudarikwa, Thomas D. Grace. 248-257 [doi]
- A data privacy model based on internet of things and cyber-physical systems reference architecturesNtsako Baloyi, Paula Kotzé. 258-268 [doi]
- A preliminary study of minimal-contention locksPhilip Machanick. 269-278 [doi]
- A DevOps collaboration culture acceptance modelT. Masombuka, Ernest Mnkandla. 279-285 [doi]
- Achieving value from enterprise architecture maturityAvsharn Bachoo. 286-295 [doi]
- Human language technology audit 2018: analysing the development trends in resource availability in all South African languagesCarmen Moors, Ilana Wilken, Karen Calteaux, Tebogo Gumede. 296-304 [doi]
- Model for knowledge capturing during system requirements elicitation in a high reliability organization: a case studyT. Kotzé, Hanlie Smuts. 305-312 [doi]
- On complexity of propositional linear-time temporal logic with finitely many variablesMikhail N. Rybakov, Dmitry Shkatov. 313-316 [doi]