Search
Now showing items 21-30 of 31
Blockchain enabled drug traceability solution: a case of drug counterfeiting in a pharmaceutical supply chain
(Strathmore University, 2020)
The pharmaceutical industry deals with manufacturing, packaging and supply of drugs to the end consumers. Being one of the major industries in Kenya, it plays a big role in the Kenyan economy as well. Most countries are ...
Application of approximate matching on industrial control system (ICS) network communication using ssdeep algorithm
(Strathmore University, 2020)
Industrial Control Systems (ICSs) are significant for functioning of numerous critical infrastructures for instance power plants, water treatment facilities and gas pipelines. In spite of the fact that security of such ...
LAN security vulnerability analysis framework: case of National Irrigation Board
(Strathmore University, 2019)
In today’s environment, many organisation like National Irrigation Board, have adopted open policies on the utilization of LAN where users may plug in unknown devices. Without the right network frameworks, it is difficult ...
Application for enhancing confidentiality and availability for sensitive user data using AES algorithm in smartphone devices
(Strathmore University, 2021)
Today’s world has seen a rapid increase in the number of users of mobile devices. Since the first mobile launch in the last quarter of the 19th century, mobile devices have evolved from their weight cost and functionalities ...
An Online neural network based password prediction, generation, and storage scheme
(Strathmore University, 2021)
The gradual change from traditional workplaces to online platforms has been attributed to shifting user requirements, economic factors, and lifestyle differences. Perhaps the most significant factor attributed to this ...
A Prototype to identify fraudulent sim card registration using Public Key infrastructure verification approach
(Strathmore University, 2021)
Identifying a legitimate subscriber is important for the Mobile Network Operators during the SIM card registration and verification process. Over the years, the use of Mobile devices has grown steadily, increasing the ...
A Model to detect and prevent rogue DHCP attacks on wireless LAN communication
(Strathmore University, 2021)
WLAN technology is a crucial component of computer networks. The use of Wi-Fi communication has grown due to the increasing population of end devices, which includes smartphones, tablets, laptops etc. This has significantly ...
Detecting zero-day attacks using Recurrent Neural Network
(Strathmore University, 2021)
The development of Information and Communications Technology (ICT) and an increase in the use of mobile technology has enabled organisations to implement and adopt the use of information and management systems to conduct ...
A Framework to secure data transmission in wearable heart-rate monitors using Elliptic Curve Cryptography (ECC)
(Strathmore University, 2022)
The wearable technology refers to biological sensors which are conveniently attached to the patient’s body to collect data about their heart rates, body temperature, oxygen levels, and physical activities. They mostly ...
A Prototype for predicting network intrusions using Bayesian based networks
(Strathmore University, 2022)
As technology advances, networks get more sophisticated. As a result, the attack surface for hackers has continued to expand leading to rapid increase in insecurity; therefore, there is need for a line of defence that is ...