GlobalView

Faculty of Science, Computer Science

Showing items 1 - 15 of 194.

Add to Quick Collection   All 194 Results

Sort:
 Add All Items to Quick Collection
Date: 2019
Language: English
Type: text
Identifier: http://hdl.handle.net/10962/65022
Description: With the increase in link speeds and the growth of the Internet, the volume of NetFlow data generated has increased significantly over time and processing these volumes has become a challenge, more sp ... More
Full Text: Full Text
Date: 2019
Language: English
Type: text
Identifier: http://hdl.handle.net/10962/71152
Description: This research is the first of its kind to investigate the utilisation of a multi-threading software-based countermeasure to mitigate Side Channel Analysis (SCA) attacks, with a particular focus on the ... More
Full Text: Full Text
Authors: Herbert, Alan
Date: 2019
Language: English
Type: text
Identifier: http://hdl.handle.net/10962/71557
Description: Since the advent of the Internet, and its public availability in the late 90’s, there have been significant advancements to network technologies and thus a significant increase of the bandwidth availa ... More
Full Text: Full Text
Authors: Johnson, Yestin
Date: 2019
Language: English
Type: text
Identifier: http://hdl.handle.net/10962/69223
Description: This research undertook an investigation in digital archaeology, modernisation, and revitalisation of the InetVis software application, developed at Rhodes University in 2007. InetVis allows users to ... More
Full Text: Full Text
Authors: Hunt, Kieran
Date: 2018
Language: English
Type: text
Identifier: http://hdl.handle.net/10962/60629
Description: Every day, computer networks throughout the world face a constant onslaught of attacks. To combat these, network administrators are forced to employ a multitude of mitigating measures. Devices such as ... More
Full Text: Full Text
Authors: Shaw, Brent
Date: 2018
Language: English
Type: text
Identifier: http://hdl.handle.net/10962/63256
Description: This research investigates the design and development of a Wireless MIDI Connection Management solution in order to create a deterministic MIDI transmission system. A investigation of the MIDI protoco ... More
Full Text: Full Text
Date: 2018
Language: English
Type: text
Identifier: http://hdl.handle.net/10962/60653
Description: Numerous software agents exist and are responsible for increasing volumes of malicious traffic that is observed on the Internet today. From a technical perspective the existing techniques for monitori ... More
Full Text: Full Text
Authors: Vermeulen, Japie
Date: 2018
Language: English
Type: text
Identifier: http://hdl.handle.net/10962/63922
Description: After more than four decades email is still the most widely used electronic communication medium today. This electronic communication medium has evolved into an electronic weapon of choice for cyber c ... More
Full Text: Full Text
Date: 2018
Language: English
Type: text
Identifier: http://hdl.handle.net/10962/62505
Description: Aptly captured in the name, the broad mandate of Information and Communications Technologies for Development (ICT4D) is to facilitate the use of Information and Communication Technologies (ICTs) in so ... More
Full Text: Full Text
Date: 2018
Language: English
Type: text
Identifier: http://hdl.handle.net/10962/63888
Description: Encryption of Personally Identifiable Information stored in a Structured Query Language Database has been difficult for a long time. This is owing to block-cipher encryption algorithms changing the le ... More
Full Text: Full Text
Date: 2018
Language: English
Type: text
Identifier: http://hdl.handle.net/10962/63245
Description: WebRTC, or Web Real-time Communications, is a collection of web standards that detail the mechanisms, architectures and protocols that work together to deliver real-time multimedia services to the web ... More
Full Text: Full Text
Date: 2018
Language: English
Type: text
Identifier: http://hdl.handle.net/10962/60618
Description: With each passing year the number of Internet users and connected devices grows, and this is particularly so in Africa, This growth brings with it an increase in the prevalence cyber-attacks. Looking ... More
Full Text: Full Text
Authors: Brown, Dane
Date: 2018
Language: English
Type: text
Identifier: http://hdl.handle.net/10962/63470
Description: Multimodal biometrics has become a popular means of overcoming the limitations of unimodal biometric systems. However, the rich information particular to the feature level is of a complex nature and l ... More
Full Text: Full Text
Date: 2018
Language: English
Type: text
Identifier: http://hdl.handle.net/10962/60639
Description: With the substantial number of new malware variants found each day, it is useful to have an efficient way to retrieve Indicators of Compromise (IOCs) from the malware in a format suitable for sharing ... More
Full Text: Full Text
Date: 2018
Language: English
Type: text
Identifier: http://hdl.handle.net/10962/61872
Description: After its birth in cryptocurrencies, distributed ledger (blockchain) technology rapidly grew in popularity in other technology domains. Alternative applications of this technology range from digitizin ... More
Full Text: Full Text

Resource Type

Date