Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/saj/saj31.bht:"
@article{DBLP:journals/saj/CoetzleeB03, author = {L. Coetzlee and Elizabeth C. Botha}, title = {Empirical results of an image-based automated vehicle identification system}, journal = {South Afr. Comput. J.}, volume = {31}, pages = {33--39}, year = {2003}, url = {http://reference.sabinet.co.za/document/EJC27951}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/CoetzleeB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/CramptonK03, author = {Jason Crampton and Hemanth Khambhammettu}, title = {Access control in a distributed object environment using {XML} and roles}, journal = {South Afr. Comput. J.}, volume = {31}, pages = {2--8}, year = {2003}, url = {http://reference.sabinet.co.za/document/EJC27956}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/CramptonK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/Kourie03, author = {Derrick G. Kourie}, title = {Editorial}, journal = {South Afr. Comput. J.}, volume = {31}, pages = {1--1}, year = {2003}, url = {http://reference.sabinet.co.za/document/EJC27955}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/Kourie03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/LukellH03, author = {S. A. Lukell and A. C. M. Hutchison}, title = {Attack analysis of cryptographic protocols using strand spaces}, journal = {South Afr. Comput. J.}, volume = {31}, pages = {25--32}, year = {2003}, url = {http://reference.sabinet.co.za/document/EJC27952}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/LukellH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/Narendra03, author = {Nanjangud C. Narendra}, title = {AdaptAgent : integrated architecture for adaptive workflow and agents}, journal = {South Afr. Comput. J.}, volume = {31}, pages = {9--17}, year = {2003}, url = {http://reference.sabinet.co.za/document/EJC27954}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/Narendra03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/Olivier03, author = {Martin S. Olivier}, title = {A layered architecture for privacy - enhancing technologies}, journal = {South Afr. Comput. J.}, volume = {31}, pages = {53--61}, year = {2003}, url = {http://reference.sabinet.co.za/document/EJC27948}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/Olivier03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/PhamJ03, author = {H. Pham and Z. Jiang}, title = {Spam control via a distributed scheme of merit accumulation}, journal = {South Afr. Comput. J.}, volume = {31}, pages = {62--69}, year = {2003}, url = {http://reference.sabinet.co.za/document/EJC27947}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/PhamJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/SchliengerT03, author = {Thomas Schlienger and Stephanie Teufel}, title = {Information security culture - from analysis to change}, journal = {South Afr. Comput. J.}, volume = {31}, pages = {46--52}, year = {2003}, url = {http://reference.sabinet.co.za/document/EJC27949}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/SchliengerT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/SmithEVBP03, author = {Elme Smith and Mariki M. Eloff and Lucas M. Venter and Andries Barnard and Laurette Pretorius}, title = {Agents, security and ethics: a framework for analysis}, journal = {South Afr. Comput. J.}, volume = {31}, pages = {18--24}, year = {2003}, url = {http://reference.sabinet.co.za/document/EJC27953}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/SmithEVBP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/VenterE03, author = {H. S. Venter and Jan H. P. Eloff}, title = {Evaluating vulnerability scanners using harmonised vulnerability categories}, journal = {South Afr. Comput. J.}, volume = {31}, pages = {40--45}, year = {2003}, url = {http://reference.sabinet.co.za/document/EJC27950}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/VenterE03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.