• Login
    Search 
    •   MUT Repository
    • Search
    •   MUT Repository
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-5 of 5

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Design and Implementation of Resilient Cooperative Bait Detection Technique to Curb Cooperative Black Hole Attacks in MANETs Using DSR Protocol 

    Mwangi, Ephantus G.; Muketha, Geoffrey M.; Kamau, Gabriel N. (Scientific & Academic Publishing, 2020-05)
    Mobile Ad-hoc networks (MANETs) are unique type of wireless networks that are infrastructureless and with no centralised management. Nodes in MANETs act as both routers and hosts. The nodes are free to join and leave the ...
    Thumbnail

    Metrics For Evaluating Alerts in Intrusion Detection Systems 

    Kiruki, Jane K.; Muketha, Geoffrey M.; Kamau, Gabriel N. (2023-01)
    Network intrusions compromise the network’s confidentiality, integrity and availability of resources. Intrusion detection systems (IDSs) have been implemented to prevent the problem. Although IDS technologies are promising, ...
    Thumbnail

    Optimized Trust-Based DSR Protocol to Curb Cooperative Blackhole Attacks in MANETs Using NS-3 

    Mwangi, Ephantus G.; Muketha, Geoffrey M.; Kamau, Gabriel N. (Scientific & Academic Publishing, 2020-05)
    MANETs Communication relies on special routing protocols that make security a challenging endeavor. MANETs are open to a range of active and passive attacks; black hole attack is an active attack affects the network layer. ...
    Thumbnail

    Trust-Based Security Technique to Curb Cooperative Blackhole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3 

    Mwangi, Ephantus G.; Muketha, Geoffrey M.; Kamau, Gabriel N. (Global Journals, 2020-12)
    The advent of mobile technology led to the emergence of Mobile Ad-hoc networks (MANETs). These networks have no infrastructure and central authority. Nodes in MANETs act as both routers and hosts. MANET nodes join and ...
    Thumbnail

    Cloud Data Privacy Preserving Model for Health Information Systems Based on Multi Factor Authentication 

    Ntonja, Kenneth G.; Muketha, Geoffrey M.; Kamau, Gabriel N. (2020-09)
    With cloud computing (CC) becoming popular in recent years, variety of institutions, organizations, businesses and individual users are creating interest. They are adopting the technology in order to take advantage of ...

    MUT Library copyright © 2017-2025  MUT Library Website
    Contact Us | Send Feedback
     

     

    Browse

    All of Research ArchiveCommunities & CollectionsBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Discover

    Author
    Kamau, Gabriel N. (5)
    Muketha, Geoffrey M. (5)
    Mwangi, Ephantus G. (3)Kiruki, Jane K. (1)Ntonja, Kenneth G. (1)SubjectRouting protocol (2)Bait detection technique (1)Cloud Computing (1)Cooperative black hole attack (1)Cooperative Blackhole and Composite Trust Values (1)Health Management Systems (1)Intrusion detection systems, honeypot, firewall, alert correlation, fuzzy logic, security metrics (1)Mobile Ad-hoc Networks (1)Multi-factor Authentication (1)Network security (1)... View MoreDate Issued2020 (4)2023 (1)Has File(s)Yes (5)

    MUT Library copyright © 2017-2025  MUT Library Website
    Contact Us | Send Feedback