Journal Articles (CI): Recent submissions
Now showing items 61-80 of 132
-
Trust-Based Security Technique to Curb Cooperative Blackhole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3
(Global Journals, 2020-12)The advent of mobile technology led to the emergence of Mobile Ad-hoc networks (MANETs). These networks have no infrastructure and central authority. Nodes in MANETs act as both routers and hosts. MANET nodes join and ... -
INFLUENCE OF SOCIAL MEDIA ON KNOWLEDGE SHARING PRACTICES IN KENYAN UNIVERSITIES: A CASE OF STRATHMORE UNIVERSITY
(The Strategic Journal of Business & Change Management Vol. 5, Iss. 4, pp 1816 - 1836,, 2018)The main objective of the research was to reveal the influence of social media tools on the sharing of knowledge in Kenyan universities. The research population was arrived at and evaluated using purposive sampling, ... -
Detection of Visual Similarity Snooping Attacks in Emails using an Extended Client Based Technique
(2021-04)This paper provides an Extended Client Based Technique (ECBT) that performs classification on emails using the Bayessian classifier that attain in-depth defense by performing textual analysis on email messages and attachment ... -
Research Methods in Machine Learning: A Content Analysis
(2021-03)Research methods in machine learning play a pivotal role since the accuracy and reliability of the results are influenced by the research methods used. The main aims of this paper were to explore current research methods ... -
An Effort Estimation Method for Service-Oriented Architecture
(2020-10-16)Determining size and effort of SOA systems is critical for managing SOA projects. As a consequence, a number of methods have been proposed to estimate effort of building SOA projects but the problem of estimating SOA ... -
Using Feature Selection Methods to Discover Common Users’ Preferences for Online Recommender Systems
(2021-01)Recommender systems have taken over user’s choice to choose the items/services they want from online markets, where lots of merchandise is traded. Collaborative filtering-based recommender systems uses user opinions and ... -
SSH-Brute Force Attack Detection Model based on Deep Learning
(2021-01)The rising number of malicious threats on computer networks and Internet services owing to a large number of attacks makes the network security be at incessant risk. One of the predominant network attacks that poses ... -
Validating Structural Metrics for BPEL Process Models
(River Publishers, 2020-10-28)Business process models tend to get more and more complex with age, which hurts the ease with which designers can understand and modify them. Few metrics have been proposed to measure this complexity, and even fewer have ... -
An Enhanced Multiview Test Case Generation Technique for Object-oriented Software using Class and Activity Diagrams
(Blue Eyes Intelligence Engineering and Sciences Publication, 2020-11)Software testing is one of the vital steps in software development life cycle. Test case generation is the first process in software testing which takes a lot of time, cost and effort to build an effective product from the ... -
A Literature Survey of Visual Similarity Snooping Attacks in Emails
(2020-08)Snooping is one of the biggest issues that the cyber security industry is facing in this modern era of technology and it leads to big losses of finances both for individuals and organizations. The detection of snooping ... -
Cloud Data Privacy Preserving Model for Health Information Systems Based on Multi Factor Authentication
(2020-09)With cloud computing (CC) becoming popular in recent years, variety of institutions, organizations, businesses and individual users are creating interest. They are adopting the technology in order to take advantage of ... -
A Metrics-Based Fuzzy Logic Model for Predicting the Reusability of Object-Oriented Software
(Blue Eyes Intelligence Engineering and Sciences Publication, 2020-08)Software reusability facilitates the engineering of new software or systems functionalities without having to start coding from scratch. This software quality provides numerous merits to the software developers including ... -
Automated Feature Extraction from UML Images to Measure SOA Size
(2020-07)Enormous development has been experiences in the field of text and image extraction and classification. This is due to large amount of image data that is generated as a result of document sharing for collaborative software ... -
Complexity Metrics for Sassy Cascading Style Sheets
(2019-01)Many front-end web developers are nowadays increasingly using sassy cascading stylesheets (SCSS) instead of the regular cascading style sheets (CSS). Despite its increased demand, SCSS has inherent complexity which arises ... -
Production Management Procedures and the Growth of Jua Kali enterprises in Kenya
(2020-06)The Micro and Small Enterprises play an important role in the economic development of most countries globally despite their level of development. The sector act as vehicle for low-income people to escape poverty through ... -
Optimized Trust-Based DSR Protocol to Curb Cooperative Blackhole Attacks in MANETs Using NS-3
(Scientific & Academic Publishing, 2020-05)MANETs Communication relies on special routing protocols that make security a challenging endeavor. MANETs are open to a range of active and passive attacks; black hole attack is an active attack affects the network layer. ... -
Design and Implementation of Resilient Cooperative Bait Detection Technique to Curb Cooperative Black Hole Attacks in MANETs Using DSR Protocol
(Scientific & Academic Publishing, 2020-05)Mobile Ad-hoc networks (MANETs) are unique type of wireless networks that are infrastructureless and with no centralised management. Nodes in MANETs act as both routers and hosts. The nodes are free to join and leave the ... -
Structural Complexity Attribute Classification Framework (SCACF) for Sassy Cascading Style Sheets
(2020-01)Several researchers have proposed the various classes of software attributes to guide in the derivation of metrics for software products. These existing classifications have targeted traditional software paradigms such as ... -
Simulation of Trust-Based Mechanism for Enhancing User Confidence in Mobile Crowdsensing Systems
(2020-01)With the rapid development of mobile technology and subsequent mass adoption of mobile devices, mobile crowdsensing (MCS) has gained a lot of research attention. In MCS systems, trust is a key focus in the overall improvement ... -
Size Metrics for Service-Oriented Architecture
(2019-03)Determining the size, effort and cost of Service-oriented Architecture (SOA) systems is important to facilitate project planning and eventually successful implementation of a software project. SOA approach is one of the ...