Search
Now showing items 1-10 of 35
Design and Implementation of Resilient Cooperative Bait Detection Technique to Curb Cooperative Black Hole Attacks in MANETs Using DSR Protocol
(Scientific & Academic Publishing, 2020-05)
Mobile Ad-hoc networks (MANETs) are unique type of wireless networks that are infrastructureless and with no centralised management. Nodes in MANETs act as both routers and hosts. The nodes are free to join and leave the ...
A Literature Survey of Visual Similarity Snooping Attacks in Emails
(2020-08)
Snooping is one of the biggest issues that the cyber security industry is facing in this modern era of technology and it leads to big losses of finances both for individuals and organizations. The detection of snooping ...
Data Preparation for Machine Learning Modelling
(2022)
The world today is on revolution 4.0 which is data-driven. The majority of organizations and systems are using data to solve problems through use of digitized systems. Data lets intelligent systems and their applications ...
Network Intrusion Detection Systems: A Systematic Literature Review of Hybrid Deep Learning Approaches
(2022-06)
Network Intrusion Detection Systems (NIDSs) have become standard security solutions that endeavours to discover unauthorized access to an organizational computer network by scrutinizing incoming and outgoing network traffic ...
A Suvery of Biometric Authentication Technologies Towards Secure And Robust Systems: A Case Study of Mount Kenya University
(2022-03)
In response to the increased demand for more effective authentication methods, the usage of biometric authentication to secure systems against unwanted access has grown. Because of the recent COVID-19 pandemic outbreak, ...
Structural Complexity Attribute Classification Framework (SCACF) for Sassy Cascading Style Sheets
(2020-01)
Several researchers have proposed the various classes of software attributes to guide in the derivation of metrics for software products. These existing classifications have targeted traditional software paradigms such as ...
SSH-Brute Force Attack Detection Model based on Deep Learning
(2021-01)
The rising number of malicious threats on computer networks and Internet services owing to a large number of attacks makes the network security be at incessant risk. One of the predominant network attacks that poses ...
An Enhanced Multiview Test Case Generation Technique for Object-oriented Software using Class and Activity Diagrams
(Blue Eyes Intelligence Engineering and Sciences Publication, 2020-11)
Software testing is one of the vital steps in software development life cycle. Test case generation is the first process in software testing which takes a lot of time, cost and effort to build an effective product from the ...
Optimized Trust-Based DSR Protocol to Curb Cooperative Blackhole Attacks in MANETs Using NS-3
(Scientific & Academic Publishing, 2020-05)
MANETs Communication relies on special routing protocols that make security a challenging endeavor. MANETs are open to a range of active and passive attacks; black hole attack is an active attack affects the network layer. ...
A systematic literature review on security indicators for open-source enterprise resource planning software
(2022-05)
Open-source enterprise resource planning (ERP) software has become a preferred alternative for modern organizations due to its affordable cost, availability and ease of access. Open-source software allows access to ...