Now showing items 1-124 of 124

      Subject
      Access Control Technologies [1]
      Android [1]
      Anomaly Detection [1]
      Anomaly detection [1]
      Anti-Money Laundering [1]
      API [1]
      Application Log [1]
      Approximate matching, [1]
      Artificial Neural Network [1]
      Attack surface--vulnerability [1]
      Authentication [2]
      Biometric [1]
      Bitcoin [1]
      Bitcoin Addresses [1]
      Blockchain [1]
      Blockchain technology [1]
      BYOA [1]
      BYOD [1]
      Certificate Authority [1]
      Certificate authority [1]
      Cloud Forensics [1]
      Command Line Interface [1]
      Communication Authority of Kenya (CA) [1]
      complex event processing [1]
      Computer networks [1]
      Confidentiality [1]
      Copyright Infringement [1]
      Countering Financing of Terrorism [1]
      Credit Card [1]
      Crime. [1]
      Cybersecurity threats [1]
      Data visualisation [1]
      DDWRT [1]
      Debit Card [1]
      Digital Evidence [1]
      Digital Forensics [3]
      Digital forensics [1]
      Digital Rights Management [1]
      Digital Signature [1]
      Digital Video Streaming [1]
      distributed fuzzer [1]
      Drug counterfeits [1]
      Drug supply chain [1]
      Drug traceability [1]
      Dynamic Host Configuration Protocol (DHCP) [1]
      Elasticsearch [1]
      Embedded Systems [1]
      Encryption [1]
      Esper [1]
      Evolutionary Prototyping [1]
      Financial Institutions [1]
      Fraud [1]
      fuzzer [1]
      Google Docs Forensics. [1]
      Graphical User Interface [1]
      hate speech [1]
      IEC 104 [1]
      Industrial Control System (ICS) [1]
      Information analysis [1]
      Information Security [1]
      Information Security Awareness [1]
      Information Security Education [1]
      Information Security Skills [1]
      Information Security Skills Assessment [1]
      Information Security Training [1]
      International Electro technical Commission [1]
      Internet of Things [2]
      Internet Protocol (IP) based cameras [1]
      IT Security [1]
      Keystroke Dynamics [1]
      Knowledge Discovery [1]
      LAN, Network [1]
      Law Enforcement Agencies [1]
      Linguistic Processing Techniques [1]
      Log Analysis [1]
      log analysis [1]
      Machine Learning [1]
      Malware analysis [1]
      Markov Chain Model [1]
      Metadata [1]
      misuse patterns [1]
      Mobile Applications [1]
      Mobile Banking [1]
      Mobile data [1]
      Mobile Devices [1]
      NAC [1]
      Naïve Bayes Algorithm [1]
      National Cohesion and Integration Commission (NCIC) [1]
      Natural Processing Language [1]
      NetScan [1]
      Network traffic analysis [1]
      Neural networks [1]
      OOXML [1]
      OpenSSL [1]
      Passwords [1]
      Phishing [1]
      Predictive analysis [1]
      Privacy [1]
      Public Key Infrastructure [2]
      Public Key infrastructure verification approach [1]
      Random Access Memory [1]
      Recurrent Neural Network [1]
      scalability [1]
      Secure Updates [1]
      Security [1]
      Security Intelligence [1]
      Security metrics [1]
      Security Risk [1]
      Sentiments Analysis [1]
      Sim card registration [1]
      social media [1]
      Spreadsheets [1]
      Terrorist Financing [1]
      Third Party Libraries [1]
      Threat Detection [1]
      Validation. [1]
      Vulnerabilities [1]
      Vulnerability [1]
      web server log [1]
      web server misuse [1]
      Wi-Fi [1]
      Wireless LAN [1]
      XML [1]
      Zero-day attacks [1]