Search
Now showing items 1-7 of 7
TCP IP header attack vectors and countermeasures
(Science publishing group, 2017-02)
The TCP IP header has security vulnerabilities that make it prone to numerous kinds of attacks such as TCP SYN flooding, TCP RST, source quench, TCP session hijacking, TCP sequence number prediction, port scanning, CHARGEN ...
Secure end point data security using java application programming interface
(IJSRSET, 2017-02)
Most of the current instant messaging applications such as Telegram Secret Chat transmit packets in plain text. This means that an intruder equipped with appropriate remote monitoring tools can sniff the packets being ...
Evaluation of TCP congestion control modus operandi in mesh networks
(International Journal of Computer Networks and Applications, 2017-01)
Abstract – In mesh networks, the sender machine is connected to the receiver machine via multiple paths. Efficient transmissions along these paths require proper link choice so as to quickly deliver the packets the ...
congestion aware packet routing for delay sensitive cloud communications
(International Journal of Computer Networks and Applications, 2017-07)
In the recent years, many organizations have turned to cloud technology to support their information technology services. The cloud servers are therefore increasingly holding huge and sensitive information belonging to ...
Factors affecting integrated financial management information system application in Kenyan public sector
(Journal of Scientific and Engineering Research, 2017)
The research aimed at assessing the factors affecting Integrated Financial Management Information system application in Kenyan public sector. There has been a very little improvement in financial management in Kenyan public ...
Evaluation of TCP congestion control modus operandi in mesh networks
(Ever Science Publications, 2017)
In mesh networks, the sender machine is connected to the receiver machine via multiple paths. Efficient transmissions along these paths require proper link choice so as to quickly deliver the packets the destination. Poor ...
Effectiveness of security controls on electronic health records
(IJSTR, 2017-12)
Electronic Health Record (EHR) systems enhance efficiency and effectiveness in handling patients ‘information in healthcare. This study focused on the EHR security by initially establishing the nature of threats affecting ...