Toggle navigation
Login
Toggle navigation
Browsing College of Computing and Information Sciences (CoCIS) by Title
Mak IR Home
College of Computing and Information Sciences (CoCIS)
Browsing College of Computing and Information Sciences (CoCIS) by Title
Mak IR Home
College of Computing and Information Sciences (CoCIS)
Browsing College of Computing and Information Sciences (CoCIS) by Title
JavaScript is disabled for your browser. Some features of this site may not work without it.
Browsing College of Computing and Information Sciences (CoCIS) by Title
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Go
Order:
ascending
descending
Results:
5
10
20
40
60
80
100
Update
Now showing items 125-144 of 604
ascending
descending
5
10
20
40
60
80
100
xmlui.ArtifactBrowser.ConfigurableBrowse.title.column_heading
Deep learning model for the detection of universal plug and play (UPNP) based attacks in UPNP devices
[1]
Delay-optimized path in peer-to-peer networks
[1]
Deploying and utilizing learning objects on mobile phones
[1]
The Deployment of an e-commerce platform and related rrojects in a rural area in South Africa
[1]
Design of a secure framework for the implementation of telemedicine, eHealth, and wellness services
[1]
Design space exploration of network on chip:a system level approach
[1]
Design techniques for a robust wireless sensor network-based automatic weather station network
[1]
Designing persuasive technologies for societal benefit: a persuasive technology for fighting electricity theft in Kampala, Uganda
[1]
Detecting money laundering using a pattern matching approach based on Rete Algorithm
[1]
A detection model for user-to-root attacks using the AdaBoost classifier
[1]
Detection of subscription fraud in telecommunications using decision tree learning
[1]
Detection of WannaCry Ransomware using machine learning techniques
[1]
Developing a framework for measuring IT project success in developing countries : a case study of Uganda
[1]
Developing a low interaction honeypot detection system in a networked environment using live environment and network analysis.
[1]
Developing a set of requirements for algorithm animation systems
[1]
The development of a power switching mechanism over the internet infrastructure
[1]
Digital library: a case of Faculty of Computing and Information Technology Book Bank
[1]
Digitalisation of library services at Igad Sheikh Technical Veterinary School (Istvs), Somaliland
[1]
The diminishing private network security perimeter defense
[1]
Disability and ICT in institutions of higher learning: Values and options for persons with disabilities
[1]
Search Mak IR
This Community
Browse
All of Mak IR
Communities & Collections
Titles
Authors
By Advisor
By Issue Date
Subjects
By Type
This Community
Titles
Authors
By Advisor
By Issue Date
Subjects
By Type
My Account
Login
Register
Statistics
Most Popular Items
Statistics by Country
Most Popular Authors