• Login
    Search 
    •   SU+ Home
    • Research and Publications
    • Faculty of Information Technology (FIT)
    • FIT Projects, Theses and Dissertations
    • MSc.ISS Theses and Dissertations
    • Search
    •   SU+ Home
    • Research and Publications
    • Faculty of Information Technology (FIT)
    • FIT Projects, Theses and Dissertations
    • MSc.ISS Theses and Dissertations
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 21-30 of 31

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Blockchain enabled drug traceability solution: a case of drug counterfeiting in a pharmaceutical supply chain 

    Ogwel, Patricia Tanya (Strathmore University, 2020)
    The pharmaceutical industry deals with manufacturing, packaging and supply of drugs to the end consumers. Being one of the major industries in Kenya, it plays a big role in the Kenyan economy as well. Most countries are ...
    Thumbnail

    Application of approximate matching on industrial control system (ICS) network communication using ssdeep algorithm 

    Mutua, Nelson Makau (Strathmore University, 2020)
    Industrial Control Systems (ICSs) are significant for functioning of numerous critical infrastructures for instance power plants, water treatment facilities and gas pipelines. In spite of the fact that security of such ...
    Thumbnail

    LAN security vulnerability analysis framework: case of National Irrigation Board 

    Wambugu, Nancy Muthoni (Strathmore University, 2019)
    In today’s environment, many organisation like National Irrigation Board, have adopted open policies on the utilization of LAN where users may plug in unknown devices. Without the right network frameworks, it is difficult ...
    Thumbnail

    Application for enhancing confidentiality and availability for sensitive user data using AES algorithm in smartphone devices 

    Nyamwaro, Valentine Nyaboke (Strathmore University, 2021)
    Today’s world has seen a rapid increase in the number of users of mobile devices. Since the first mobile launch in the last quarter of the 19th century, mobile devices have evolved from their weight cost and functionalities ...
    Thumbnail

    An Online neural network based password prediction, generation, and storage scheme 

    Mbaka, Winnie Bahati (Strathmore University, 2021)
    The gradual change from traditional workplaces to online platforms has been attributed to shifting user requirements, economic factors, and lifestyle differences. Perhaps the most significant factor attributed to this ...
    Thumbnail

    A Prototype to identify fraudulent sim card registration using Public Key infrastructure verification approach 

    Wanja, Gate Maureen (Strathmore University, 2021)
    Identifying a legitimate subscriber is important for the Mobile Network Operators during the SIM card registration and verification process. Over the years, the use of Mobile devices has grown steadily, increasing the ...
    Thumbnail

    A Model to detect and prevent rogue DHCP attacks on wireless LAN communication 

    Wachira, Fiona Njeri (Strathmore University, 2021)
    WLAN technology is a crucial component of computer networks. The use of Wi-Fi communication has grown due to the increasing population of end devices, which includes smartphones, tablets, laptops etc. This has significantly ...
    Thumbnail

    Detecting zero-day attacks using Recurrent Neural Network 

    Ndungu, George Muchiri (Strathmore University, 2021)
    The development of Information and Communications Technology (ICT) and an increase in the use of mobile technology has enabled organisations to implement and adopt the use of information and management systems to conduct ...
    Thumbnail

    A Framework to secure data transmission in wearable heart-rate monitors using Elliptic Curve Cryptography (ECC) 

    Onyango, Oscar Omondi (Strathmore University, 2022)
    The wearable technology refers to biological sensors which are conveniently attached to the patient’s body to collect data about their heart rates, body temperature, oxygen levels, and physical activities. They mostly ...
    Thumbnail

    A Prototype for predicting network intrusions using Bayesian based networks 

    Kirui, Pamela Chemutai (Strathmore University, 2022)
    As technology advances, networks get more sophisticated. As a result, the attack surface for hackers has continued to expand leading to rapid increase in insecurity; therefore, there is need for a line of defence that is ...
    • 1
    • 2
    • 3
    • 4

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of SU+Communities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CommunityBy Issue DateAuthorsTitlesSubjects

    My Account

    Login

    Discover

    AuthorAdhi, Banchale Gufu (1)Gitau, Wilson Ndungi (1)Godiah, David Odhiambo (1)Gono, Alfred Regerai (1)Kimathi, Collins Chandi (1)Kirui, Pamela Chemutai (1)Litunya, Duncan Oyando Akhonya (1)Maalim, Farhiya Osman (1)Macharia, Caroline Wanjira (1)Maingi, Eunice M. (1)... View MoreSubjectDigital Forensics (3)Authentication (2)Internet of Things (2)Public Key Infrastructure (2)Access Control Technologies (1)Android (1)Anomaly Detection (1)Anomaly detection (1)Anti-Money Laundering (1)API (1)... View MoreDate Issued2018 (9)2017 (6)2019 (6)2021 (5)2022 (3)2020 (2)Has File(s)
    Yes (31)

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV