Search
Now showing items 11-20 of 95
TCP IP header attack vectors and countermeasures
(Science publishing group, 2017-02)
The TCP IP header has security vulnerabilities that make it prone to numerous kinds of attacks such as TCP SYN flooding, TCP RST, source quench, TCP session hijacking, TCP sequence number prediction, port scanning, CHARGEN ...
Assessing emerging innovative applications used in county governments of Kenya
(International Journal of Advanced Research in Computer and Communication Engineering, 2017-08)
In this modern age, the world has witnessed rapid growth and ever-increasing importance of e-government and governments are under pressure from citizens to quick and efficient services. Despite the Kenyan government efforts ...
Secure end point data security using java application programming interface
(IJSRSET, 2017-02)
Most of the current instant messaging applications such as Telegram Secret Chat transmit packets in plain text. This means that an intruder equipped with appropriate remote monitoring tools can sniff the packets being ...
Applying data mining principles in the extraction of digital evidence
(International Journal of Computer Science and Mobile Computing, 2018-03)
Data mining in databases is part of the interdisciplinary field of knowledge discovery used for extracting patterns and relationships amongst the data sets from a data source. This paper focuses on mining data from a ...
Evaluation of TCP congestion control modus operandi in mesh networks
(International Journal of Computer Networks and Applications, 2017-01)
Abstract – In mesh networks, the sender machine is connected to the receiver machine via multiple paths. Efficient transmissions along these paths require proper link choice so as to quickly deliver the packets the ...
Validation of extended theory of reasoned action to predict mobile phone money usage
(Horizon Research, 2018)
Theory of Reasoned Action (TRA), postulated by social psychologist, has been established to be relevant in guiding Information Systems studies. The theory resulted from attitude research using the Expectancy Value Models. ...
Investigating design issues in mobile computer-mediated communication technologies
(Taylor&Francis, 2015-12)
Mobility is the new reality of business and stands to have a significant impact on the implementation of mobile computer-mediated communication (mCMC), such as mobile texting, mobile video, and mobile presence. Information ...
A Framework for secure mobile cloud computing in effective electronic learning
(International Journal of Innovative Research and Advanced Studies, 2018-01)
Abstract: In the last few years, most universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing ...
Model for information security governance prediction in public Universities in Kenya
(2018)
Information is one of the most important assets in Organizations worldwide. To enable secure business operations, an organization must have an effective security governance strategy. The study focused on Information security ...
congestion aware packet routing for delay sensitive cloud communications
(International Journal of Computer Networks and Applications, 2017-07)
In the recent years, many organizations have turned to cloud technology to support their information technology services. The cloud servers are therefore increasingly holding huge and sensitive information belonging to ...