• Login
    Search 
    •   SU+ Home
    • Research and Publications
    • Faculty of Information Technology (FIT)
    • FIT Projects, Theses and Dissertations
    • MSc.ISS Theses and Dissertations
    • Search
    •   SU+ Home
    • Research and Publications
    • Faculty of Information Technology (FIT)
    • FIT Projects, Theses and Dissertations
    • MSc.ISS Theses and Dissertations
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-9 of 9

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Open source intelligence gathering for hate speech in Kenya 

    Adhi, Banchale Gufu (Strathmore University, 2018)
    The Internet has been celebrated for its ability to erode barriers between nations. Social media is a powerful medium that can unite, inform, and move people. One post can start a chain of events that changes the world. ...
    Thumbnail

    Distributed fuzzing for software vulnerability discovery 

    Maalim, Farhiya Osman (Strathmore University, 2018)
    Information Security is concerned with effectively protecting the confidentiality, integrity and availability of data. Software bugs/defects threaten these three elements of information security. By failing to identify and ...
    Thumbnail

    Investigating keystroke dynamics as a two-factor biometric security 

    Njogholo, Brian Mwandau (Strathmore University, 2018)
    Keystroke dynamics is the study of how people can be distinguished based on their typing rhythms. This proposal aims at investigating user authentication approaches and how keystroke dynamics can be used to enhance user ...
    Thumbnail

    Design and implementation of a private certificate authority: a case study of Telkom Kenya limited 

    Moraa, Deborah Rioba (Strathmore University, 2018)
    Public Key Infrastructure (PKI) provides confidentiality and integrity to an enterprise and its customers. Applications accessed through corporate network needs to be protected when in transit and hence the need for a ...
    Thumbnail

    Digital content security: video streaming digital rights management system 

    Owenda, Benjamin Odonya (Strathmore University, 2018)
    The usability and applicability of digital videos, especially through the Internet, offers great opportunities for Kenyan content creators to further their careers as the platform enables them to share ideas which contributes ...
    Thumbnail

    Secure plugin for automated software updates using Public Key Infrastructure for embedded systems 

    Mbuvi, Victor Malombe (Strathmore University, 2018)
    Embedded systems are the driving force for technological development in many domains such as automotive, healthcare, and industrial control in the emerging post-PC era. As more and more computational and networked devices ...
    Thumbnail

    A Platform for analyzing log files using temporal logic approach: a test case with web server logs 

    Muema, Peris Ndululu (Strathmore University, 2018)
    Web logs are a set of recorded events between clients and web servers. Information provided by these events is valuable to computer system administrators, digital forensic investigators and system security personnel during ...
    Thumbnail

    A Collaborative tool to prevent fraudulent usage of financial cards 

    Gitau, Wilson Ndungi (Strathmore University, 2018)
    Technology usage has advanced a great deal in banking and telecommunication sectors. With the continuous improving infrastructures in information technology, new technological dimensions have been opened up to ease processes ...
    Thumbnail

    Securing a "Bring Your Own Application" cloud environment using digital forensics 

    Litunya, Duncan Oyando Akhonya (Strathmore University, 2018)
    The use of cloud applications introduces new challenges to information systems Security. The idea of applications accessible from multiple devices and hosted or provided by third party organizations brings new complications ...

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of SU+Communities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CommunityBy Issue DateAuthorsTitlesSubjects

    My Account

    Login

    Discover

    AuthorAdhi, Banchale Gufu (1)Gitau, Wilson Ndungi (1)Litunya, Duncan Oyando Akhonya (1)Maalim, Farhiya Osman (1)Mbuvi, Victor Malombe (1)Moraa, Deborah Rioba (1)Muema, Peris Ndululu (1)Njogholo, Brian Mwandau (1)Owenda, Benjamin Odonya (1)SubjectPublic Key Infrastructure (2)Access Control Technologies (1)API (1)Artificial Neural Network (1)Authentication (1)Biometric (1)BYOA (1)Certificate Authority (1)Cloud Forensics (1)Communication Authority of Kenya (CA) (1)... View MoreDate Issued
    2018 (9)
    Has File(s)
    Yes (9)

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV