• Login
    Search 
    •   SU+ Home
    • Research and Publications
    • Faculty of Information Technology (FIT)
    • FIT Projects, Theses and Dissertations
    • MSc.ISS Theses and Dissertations
    • Search
    •   SU+ Home
    • Research and Publications
    • Faculty of Information Technology (FIT)
    • FIT Projects, Theses and Dissertations
    • MSc.ISS Theses and Dissertations
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 11-20 of 31

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Forensic analysis of office open XML spreadsheets 

    Godiah, David Odhiambo (Strathmore University, 2017)
    Digital Forensics is the science of acquiring, preserving, analysing and presenting digital evidence from computers, digital devices and networks in a manner that is admissible in a court of law to support an investigation. ...
    Thumbnail

    Mitigating security implications of bringing your own device in an enterprise environment 

    Gono, Alfred Regerai (Strathmore University, 2019)
    The rapid growth in the bring your own device (BYOD) phenomenon, has resulted in the introduction of personal mobile devices in the Enterprise environment. The benefit derived from embracing BYOD in organisations is enhanced ...
    Thumbnail

    Secure plugin for automated software updates using Public Key Infrastructure for embedded systems 

    Mbuvi, Victor Malombe (Strathmore University, 2018)
    Embedded systems are the driving force for technological development in many domains such as automotive, healthcare, and industrial control in the emerging post-PC era. As more and more computational and networked devices ...
    Thumbnail

    OpenSSL vulnerabilities in mobile banking applications 

    Muriuki, Paul William (Strathmore University, 2017)
    Mobile banking has taken Kenya by storm. It is an easy and convenient banking channel in your hands. It is accessible from anywhere provided you have an internet connection or connectivity to your mobile network provider. ...
    Thumbnail

    A Web based information security skills assessment prototype 

    Nkonge, Regina Kagwiria (Strathmore University, 2017)
    Cyber-attacks are continuously evolving to a great extent faster than cyber defences. The result is an ever-increasing frequency of attacks and the probability of success over time. To ensure employees are able to avoid ...
    Thumbnail

    A Platform for analyzing log files using temporal logic approach: a test case with web server logs 

    Muema, Peris Ndululu (Strathmore University, 2018)
    Web logs are a set of recorded events between clients and web servers. Information provided by these events is valuable to computer system administrators, digital forensic investigators and system security personnel during ...
    Thumbnail

    A Platform for monitoring of security and audit events: a test case with windows systems 

    Kimathi, Collins Chandi (Strathmore University, 2017)
    The rise in cyber attacks against organisations and government agencies has created a need for improving security and monitoring of Information Technology assets. Analysis and monitoring of security events are one of the ...
    Thumbnail

    Access controls on IP based cameras in IoT ecosystem 

    Muya, Mary Wairimu (Strathmore University, 2019)
    Internet of things (IoT) is a concept of connected things that allows embedded devices, sensors and actuators to interconnect and share data thus bridging the gap between physical devices and virtual objects. The concept ...
    Thumbnail

    A Collaborative tool to prevent fraudulent usage of financial cards 

    Gitau, Wilson Ndungi (Strathmore University, 2018)
    Technology usage has advanced a great deal in banking and telecommunication sectors. With the continuous improving infrastructures in information technology, new technological dimensions have been opened up to ease processes ...
    Thumbnail

    Securing a "Bring Your Own Application" cloud environment using digital forensics 

    Litunya, Duncan Oyando Akhonya (Strathmore University, 2018)
    The use of cloud applications introduces new challenges to information systems Security. The idea of applications accessible from multiple devices and hosted or provided by third party organizations brings new complications ...
    • 1
    • 2
    • 3
    • 4

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of SU+Communities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CommunityBy Issue DateAuthorsTitlesSubjects

    My Account

    Login

    Discover

    AuthorAdhi, Banchale Gufu (1)Gitau, Wilson Ndungi (1)Godiah, David Odhiambo (1)Gono, Alfred Regerai (1)Kimathi, Collins Chandi (1)Kirui, Pamela Chemutai (1)Litunya, Duncan Oyando Akhonya (1)Maalim, Farhiya Osman (1)Macharia, Caroline Wanjira (1)Maingi, Eunice M. (1)... View MoreSubjectDigital Forensics (3)Authentication (2)Internet of Things (2)Public Key Infrastructure (2)Access Control Technologies (1)Android (1)Anomaly Detection (1)Anomaly detection (1)Anti-Money Laundering (1)API (1)... View MoreDate Issued2018 (9)2017 (6)2019 (6)2021 (5)2022 (3)2020 (2)Has File(s)
    Yes (31)

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV