Search
Now showing items 1-3 of 3
Experimental validation of the technical attack ability metrics model
(International Journal of Information and Communication Technology Research, 2013)
Computer systems have become gradually and fully embedded into our daily activities. Software based systems attackers have noted these dependency, and have increased the number of attacks of such systems. Software managers ...
Trends in electronic money transfer in Kenya
(Journal of Emerging Trends in Computing and Information Sciences, 2013)
The paper looks at trends in Electronic money transfer in Kenya, based on literature survey of prior research done in this area. The Central Bank of Kenya was a key source of data because of its significance in financial ...
Social attackability metrics for software systems
(International Journal of Information and Communication Technology Research, 2013)
Software based system have become ubiquitous in modern day activities. Software system based system are being increasing attacked, leading to the need for software system administrators, and managers to have some metrics ...