• Login
    Search 
    •   MUT Repository
    • Search
    •   MUT Repository
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 12

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Design and Implementation of Resilient Cooperative Bait Detection Technique to Curb Cooperative Black Hole Attacks in MANETs Using DSR Protocol 

    Mwangi, Ephantus G.; Muketha, Geoffrey M.; Kamau, Gabriel N. (Scientific & Academic Publishing, 2020-05)
    Mobile Ad-hoc networks (MANETs) are unique type of wireless networks that are infrastructureless and with no centralised management. Nodes in MANETs act as both routers and hosts. The nodes are free to join and leave the ...
    Thumbnail

    Structural Complexity Attribute Classification Framework (SCACF) for Sassy Cascading Style Sheets 

    Ndia, John G.; Muketha, Geoffrey M.; Omieno, K. K. (2020-01)
    Several researchers have proposed the various classes of software attributes to guide in the derivation of metrics for software products. These existing classifications have targeted traditional software paradigms such as ...
    Thumbnail

    An Enhanced Multiview Test Case Generation Technique for Object-oriented Software using Class and Activity Diagrams 

    Mburu, James M.; Muketha, Geoffrey M.; Oirere, Aaron M. (Blue Eyes Intelligence Engineering and Sciences Publication, 2020-11)
    Software testing is one of the vital steps in software development life cycle. Test case generation is the first process in software testing which takes a lot of time, cost and effort to build an effective product from the ...
    Thumbnail

    Optimized Trust-Based DSR Protocol to Curb Cooperative Blackhole Attacks in MANETs Using NS-3 

    Mwangi, Ephantus G.; Muketha, Geoffrey M.; Kamau, Gabriel N. (Scientific & Academic Publishing, 2020-05)
    MANETs Communication relies on special routing protocols that make security a challenging endeavor. MANETs are open to a range of active and passive attacks; black hole attack is an active attack affects the network layer. ...
    Thumbnail

    Validating Structural Metrics for BPEL Process Models 

    Muketha, Geoffrey M.; Ghani, A. A. A.; Atan, R. (River Publishers, 2020-10-28)
    Business process models tend to get more and more complex with age, which hurts the ease with which designers can understand and modify them. Few metrics have been proposed to measure this complexity, and even fewer have ...
    Thumbnail

    Implementation of a Structural Complexity Metrics Tool for Sassy Cascading Style Sheets (SCMT-SCSS) 

    Ndia, John G.; Muketha, Geoffrey M.; Omieno, Kelvin Kabeti (2020)
    The development of metrics tool is a basic requirement for the defined software metrics to be acceptable in the software industry. There are several metrics proposed over the years without tool support and this trend cannot ...
    Thumbnail

    Automated Feature Extraction from UML Images to Measure SOA Size 

    Munialo, S. W.; Muketha, Geoffrey M.; Omieno, K. K. (2020-07)
    Enormous development has been experiences in the field of text and image extraction and classification. This is due to large amount of image data that is generated as a result of document sharing for collaborative software ...
    Thumbnail

    A Metrics-Based Fuzzy Logic Model for Predicting the Reusability of Object-Oriented Software 

    Onyango, Kevin A.; Muketha, Geoffrey M.; Micheni, E. M. (Blue Eyes Intelligence Engineering and Sciences Publication, 2020-08)
    Software reusability facilitates the engineering of new software or systems functionalities without having to start coding from scratch. This software quality provides numerous merits to the software developers including ...
    Thumbnail

    Trust-Based Security Technique to Curb Cooperative Blackhole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3 

    Mwangi, Ephantus G.; Muketha, Geoffrey M.; Kamau, Gabriel N. (Global Journals, 2020-12)
    The advent of mobile technology led to the emergence of Mobile Ad-hoc networks (MANETs). These networks have no infrastructure and central authority. Nodes in MANETs act as both routers and hosts. MANET nodes join and ...
    Thumbnail

    Cloud Data Privacy Preserving Model for Health Information Systems Based on Multi Factor Authentication 

    Ntonja, Kenneth G.; Muketha, Geoffrey M.; Kamau, Gabriel N. (2020-09)
    With cloud computing (CC) becoming popular in recent years, variety of institutions, organizations, businesses and individual users are creating interest. They are adopting the technology in order to take advantage of ...
    • 1
    • 2

    MUT Library copyright © 2017-2025  MUT Library Website
    Contact Us | Send Feedback
     

     

    Browse

    All of Research ArchiveCommunities & CollectionsBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Discover

    Author
    Muketha, Geoffrey M. (12)
    Kamau, Gabriel N. (4)Mwangi, Ephantus G. (3)Omieno, K. K. (3)Munialo, S. W. (2)Ndia, John G. (2)Atan, R. (1)Ghani, A. A. A. (1)Kalui, D. M. (1)Mburu, James M. (1)... View MoreSubjectRouting protocol (2)Analytical Hierarchical Process (1)Bait detection technique (1)Behavioral models (1)BPEL processes (1)business process models (1)Cascading Style Sheets (1)Cloud Computing (1)Cooperative black hole attack (1)Cooperative Blackhole and Composite Trust Values (1)... View MoreDate Issued
    2020 (12)
    Has File(s)Yes (12)

    MUT Library copyright © 2017-2025  MUT Library Website
    Contact Us | Send Feedback