Search
Now showing items 1-9 of 9
Open source intelligence gathering for hate speech in Kenya
(Strathmore University, 2018)
The Internet has been celebrated for its ability to erode barriers between nations. Social media is a powerful medium that can unite, inform, and move people. One post can start a chain of events that changes the world. ...
Distributed fuzzing for software vulnerability discovery
(Strathmore University, 2018)
Information Security is concerned with effectively protecting the confidentiality, integrity and availability of data. Software bugs/defects threaten these three elements of information security. By failing to identify and ...
Investigating keystroke dynamics as a two-factor biometric security
(Strathmore University, 2018)
Keystroke dynamics is the study of how people can be distinguished based on their typing rhythms. This proposal aims at investigating user authentication approaches and how keystroke dynamics can be used to enhance user ...
Design and implementation of a private certificate authority: a case study of Telkom Kenya limited
(Strathmore University, 2018)
Public Key Infrastructure (PKI) provides confidentiality and integrity to an enterprise and its customers. Applications accessed through corporate network needs to be protected when in transit and hence the need for a ...
Digital content security: video streaming digital rights management system
(Strathmore University, 2018)
The usability and applicability of digital videos, especially through the Internet, offers great opportunities for Kenyan content creators to further their careers as the platform enables them to share ideas which contributes ...
Secure plugin for automated software updates using Public Key Infrastructure for embedded systems
(Strathmore University, 2018)
Embedded systems are the driving force for technological development in many domains such as automotive, healthcare, and industrial control in the emerging post-PC era. As more and more computational and networked devices ...
A Platform for analyzing log files using temporal logic approach: a test case with web server logs
(Strathmore University, 2018)
Web logs are a set of recorded events between clients and web servers. Information provided by these events is valuable to computer system administrators, digital forensic investigators and system security personnel during ...
A Collaborative tool to prevent fraudulent usage of financial cards
(Strathmore University, 2018)
Technology usage has advanced a great deal in banking and telecommunication sectors. With the continuous improving infrastructures in information technology, new technological dimensions have been opened up to ease processes ...
Securing a "Bring Your Own Application" cloud environment using digital forensics
(Strathmore University, 2018)
The use of cloud applications introduces new challenges to information systems Security. The idea of applications accessible from multiple devices and hosted or provided by third party organizations brings new complications ...