Search
Now showing items 1-10 of 31
Open source intelligence gathering for hate speech in Kenya
(Strathmore University, 2018)
The Internet has been celebrated for its ability to erode barriers between nations. Social media is a powerful medium that can unite, inform, and move people. One post can start a chain of events that changes the world. ...
Distributed fuzzing for software vulnerability discovery
(Strathmore University, 2018)
Information Security is concerned with effectively protecting the confidentiality, integrity and availability of data. Software bugs/defects threaten these three elements of information security. By failing to identify and ...
A Client based email phishing detection algorithm: case of phishing attacks in the banking industry
(Strathmore University, 2017)
Today, the banking sector has been a target for many phishing attackers. The use of email as an electronic means of communication during working hours and mostly for official purposes has made it a lucrative attack vector. ...
A Web based tool for securing digital evidence
(Strathmore University, 2019)
Digital forensics is defined as a scientific knowledge and methods applied to the identification, acquisition, preservation, examination, and analysis of information stored or transmitted in binary form in a manner acceptable ...
Investigating keystroke dynamics as a two-factor biometric security
(Strathmore University, 2018)
Keystroke dynamics is the study of how people can be distinguished based on their typing rhythms. This proposal aims at investigating user authentication approaches and how keystroke dynamics can be used to enhance user ...
Developing an automated malware detection, analysis and reporting tool for MS-Windows
(Strathmore University, 2019)
Memory and computer forensics is a field that has witnessed a lot of advancements in the recent past. Memory forensics enables investigators acquire and investigate the content of a computer’s RAM while computer forensics ...
Design and implementation of a private certificate authority: a case study of Telkom Kenya limited
(Strathmore University, 2018)
Public Key Infrastructure (PKI) provides confidentiality and integrity to an enterprise and its customers. Applications accessed through corporate network needs to be protected when in transit and hence the need for a ...
Employee awareness on social engineering threats in the financial sector
(Strathmore University, 2019)
Despite the great gains that have been achieved through use of the Internet, a lot of threats have also emanated in equal measure from its increased usage. Some of the threats are largely associated with cyber-attacks. ...
Maintaining a bitcoin address repository through focused web crawling
(Strathmore University, 2017)
There has been an increase in the use of cryptocurrencies such as Bitcoin (BTC). Bitcoin allow for cross-border payments, for large and small items at little or no transaction fee. It is a groundbreaking technology that ...
Digital content security: video streaming digital rights management system
(Strathmore University, 2018)
The usability and applicability of digital videos, especially through the Internet, offers great opportunities for Kenyan content creators to further their careers as the platform enables them to share ideas which contributes ...