127 results on '"Oreku, George S."'
Search Results
2. List of contributors
3. Security Issues in Mobile Devices and Mobile Adhoc Networks
4. Improved Feistel-Based Ciphers for Wireless Sensor Network Security
5. Reliable Data Aggregation Protocol for Wireless Sensor Networks
6. Mathematical Model for Wireless Sensor Nodes Security
7. The Distributed Signature Scheme (DSS) Based on RSA
8. QoS as Means of Providing WSN Security
9. Introduction and Overview
10. Cybercrime: Concerns, Challenges and Opportunities
11. Security Issues in Mobile Devices and Mobile Adhoc Networks
12. Deployment of Computer Science Curriculum: Does That Translate Into Entrepreneurial Skills? Mediating From ICT Role
13. A Study of Online Database Servers: The Case of SQL - Injection, How Evil that could be?
14. Exploring Consumers Satisfaction and General Public Image to the Tanzania Bureau of Standard (TBS): Expert Survey
15. ICT in Education: Mapping Digital Learning Initiatives in Tanzania
16. A Comparative Study of Replica Placement Strategies in Data Grids
17. Cybercrime: Concerns, Challenges and Opportunities
18. Security in Wireless Sensor Networks
19. Introduction and Overview
20. Reliable Data Aggregation Protocol for Wireless Sensor Networks
21. Improved Feistel-Based Ciphers for Wireless Sensor Network Security
22. QoS as Means of Providing WSN Security
23. The Distributed Signature Scheme (DSS) Based on RSA
24. Mathematical Model for Wireless Sensor Nodes Security
25. Chapter 6 - Artificial Intelligence and Machine Learning Applications in Cloud Computing and Internet of Things
26. A Rule-based Approach for Resolving Cybercrime in Financial Institutions: The Tanzania case
27. Adopting the ICT Innovation to Administrative and Activity Procedures in a University
28. Improved Feistel-based ciphers for wireless sensor network security
29. Real-time sickle cell anemia diagnosis based hardware accelerator
30. Applications of Cognitive Intelligence in the Information Retrieval Process and Associated Challenges
31. A Review of e-Government Initiatives in Tanzania
32. End User Authentication (EUA) Model and Password for Security
33. Usability evaluation of frugal innovation: A case of mobile training for micro businesses in Tanzania
34. Mobile Devices in supporting members’ participation to Village Community Banks: The Design Thinking Approach
35. End user authentication (EUA) model and password for security
36. Usability evaluation of frugal innovation: A case of mobile training for micro businesses in Tanzania.
37. Mobile Phone
38. Security in Wireless Sensor Networks / by George S. Oreku, Tamara Pazynyuk.
39. On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach
40. FrontMatter.
41. A Comparative Study of Replica Placement Strategies in Data Grids
42. A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy
43. A viewpoint of Tanzania e-commerce and implementation barriers
44. Mobile technology interaction to e–Commerce in promising of u–Commerce
45. Traffic classification and packet detections to facilitate networks security
46. Intrusion Detection Based on Data Mining
47. Using Nature to Best Clarify Computer Security and Threats
48. State of Tanzania e-readiness and e-commerce: Overview
49. A framework towards enhancing trust and authorisation for e-commerce service
50. Mathematical model for wireless sensor nodes security
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.