Filter by: Subject

Please note that UPSpace will be unavailable from Friday, 2 May at 18:00 (South African Time) until Sunday, 4 May at 20:00 due to scheduled system upgrades. We apologise for any inconvenience this may cause and appreciate your understanding.

Filter by: Subject

Results Per Page:

Particle swarm optimization (PSO) (33)
Digital forensics (21)
SDG-09: Industry, innovation and infrastructure (21)
Swarm intelligence (10)
Dynamic environments (8)
Machine learning (8)
Digital evidence (7)
Digital forensic readiness (DFR) (7)
Optimization (7)
Digital forensic readiness (6)
Genetic programming (6)
Algorithms (5)
Artificial intelligence (AI) (5)
Cloud computing (5)
Coronavirus disease 2019 (COVID-19) (5)
COVID-19 pandemic (5)
Deep learning (5)
Security (5)
Sentiment analysis (5)
Social media (5)
Software engineering (5)
Android (4)
Artificial intelligence (4)
Big data (4)
Botnet (4)
Concept drift (4)
Differential evolution (4)
Digital forensic process (4)
Evolutionary algorithms (4)
Evolutionary computation (4)
Feature selection (4)
Forensic science (4)
Fuzzy logic (4)
Internet of Things (IoT) (4)
Neural network (4)
Neural networks (4)
South Africa (SA) (4)
Stability analysis (4)
Access control (3)
Algorithm (3)
Automated design (3)
Bounded model checking (3)
Cloud (3)
Computational intelligence (3)
Computer science (3)
Computer software -- Development (3)
Database forensics (3)
Identity deception (3)
Information security (3)
Malware (3)
Multi-objective optimization (3)
Natural language processing (NLP) (3)
Potential digital evidence (PDE) (3)
Sensitive information (3)
Smartphones (3)
Social engineering (3)
Social media platform (SMP) (3)
Stability criteria (3)
Topic modelling (3)
Wireless sensor network (WSN) (3)
Acceleration coefficients (2)
Agent-based solution (ABS) (2)
Algorithm design and analysis (2)
Artificial immune systems (2)
Artificial neural network (ANN) (2)
Authentication (2)
Bench-mark problems (2)
Benchmark functions (2)
Benchmarking (2)
Benford’s law (2)
Bidirectional communication (2)
Blockchain (2)
Bots (2)
Boundary constraints (2)
Challenges (2)
Command and control (2)
Computer forensics (2)
Computer security (2)
Concurrent software systems (2)
Convergence (2)