Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Pheeha Machaka"'
Autor:
Adele Da Veiga, Keshnee Padayachee, Mathias Mujinga, Elmarie Kritzinger, Pheeha Machaka, Elisha Oketch Ochola, Emilia Mwim, Marianne Loock
Publikováno v:
Human Aspects of Information Security and Assurance ISBN: 9783030811105
HAISA
HAISA
The objective of this study is to propose a cybersecurity curriculum from a best practice perspective for universities and other higher educational institutions. Cybersecurity is a fast-growing part of the overall job market and cybersecurity skills
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fb671d16ca052509fd39e005d42c128d
https://doi.org/10.1007/978-3-030-81111-2_5
https://doi.org/10.1007/978-3-030-81111-2_5
Autor:
Pheeha Machaka, Antoine Bagula
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030671006
The work presented in this paper is an implementation of a design of a DDoS simulation testbed that uses parameter estimation and probability fitting of source IP address features of a network. We explored the issue of lack of adequate and recent eva
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7c3d437cfeeea271b81c3dba13e1476b
https://doi.org/10.1007/978-3-030-67101-3_4
https://doi.org/10.1007/978-3-030-67101-3_4
Data Mining Techniques for Distributed Denial of Service Attacks Detection in the Internet of Things
Autor:
Pheeha Machaka, Fulufhelo Nelwamondo
This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::af841de23c59997025e53a6df9fabe2f
https://doi.org/10.4018/978-1-5225-9866-4.ch030
https://doi.org/10.4018/978-1-5225-9866-4.ch030
Publikováno v:
Computed Tomography-Advanced Applications
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::25f5d6ce1bdb132d0e440777ce5d8498
http://www.intechopen.com/articles/show/title/novelty-detection-based-internal-fingerprint-segmentation-in-optical-coherence-tomography-images
http://www.intechopen.com/articles/show/title/novelty-detection-based-internal-fingerprint-segmentation-in-optical-coherence-tomography-images
Publikováno v:
2016 Pattern Recognition Association of South Africa and Robotics and Mechatronics International Conference (PRASA-RobMech).
This paper seeks to investigate the performance of the Exponentially Weighted Moving Average (EWMA) for mining big data and detection of DDoS attacks in Internet of Things (IoT) infrastructure. The paper will investigate the tradeoff between the al
Data Mining Techniques for Distributed Denial of Service Attacks Detection in the Internet of Things
This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::aefa1ad8d45bb8a435446cfcaaad1bae
https://doi.org/10.4018/978-1-5225-0463-4.ch010
https://doi.org/10.4018/978-1-5225-0463-4.ch010
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319292359
ICCASA
ICCASA
The paper presents the threats that are present in Internet of Things (IoT) systems and how they can be used to perpetuate a large scale DDoS attack. The paper investigates how the Cumulative Sum (CUSUM) algorithm can be used to detect a DDoS attack
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d5f3a16db30303cac34e3351fa7b422c
https://doi.org/10.1007/978-3-319-29236-6_7
https://doi.org/10.1007/978-3-319-29236-6_7
Autor:
Antoine Bagula, Pheeha Machaka
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319168678
Infoscale
Infoscale
The paper seeks to investigate the use of scalable machine learning techniques to address anomaly detection problem in a large Wi-Fi network. This was in the efforts of achieving a highly scalable preemptive monitoring tool for wireless networks. The
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::02479f1d9325b2249c77814ae44f1c40
https://doi.org/10.1007/978-3-319-16868-5_7
https://doi.org/10.1007/978-3-319-16868-5_7
Autor:
Pheeha Machaka
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319059389
ICCASA
ICCASA
This paper investigates the use of Soft Computing techniques on a drought monitoring case study. This is in effort to create an intelligent middleware for Ubiquitous Sensor Networks (USN) using machine learning techniques. Algorithms in Artificial Im
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0cd5500e12b8c429172823f687fc1b24
https://doi.org/10.1007/978-3-319-14227-2_5
https://doi.org/10.1007/978-3-319-14227-2_5
Publikováno v:
IDAACS-SWS
The paper introduces a monitoring tool that was designed for an existing network of Wi-Fi hotspots. This was done by adding data collection and visualization components to the existing network. Syslog protocol was used for data collection and left ru