Using exponentially weighted moving average algorithm to defend against DDoS attacks P Machaka, A Bagula, F Nelwamondo 2016 Pattern recognition association of South Africa and robotics and …, 2016 | 28 | 2016 |
Using the cumulative sum algorithm against distributed denial of service attacks in internet of things P Machaka, A McDonald, F Nelwamondo, A Bagula Context-Aware Systems and Applications: 4th International Conference, ICCASA …, 2016 | 22 | 2016 |
Modelling DDoS attacks in IoT networks using machine learning P Machaka, O Ajayi, F Kahenga, A Bagula, K Kyamakya International Conference on Emerging Technologies for Developing Countries …, 2022 | 12 | 2022 |
Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey P Machaka, F Nelwamondo Securing the Internet of Things: Concepts, Methodologies, Tools, and …, 2020 | 6 | 2020 |
Statistical properties and modelling of DDoS attacks P Machaka, A Bagula Context-Aware Systems and Applications, and Nature of Computation and …, 2021 | 5 | 2021 |
Monitoring of a large Wi-Fi hotspots network: performance investigation of soft computing techniques P Machaka, T Mabande, A Bagula Bio-Inspired Models of Networks, Information, and Computing Systems: 6th …, 2012 | 4 | 2012 |
A Reference Point for Designing a Cybersecurity Curriculum for Universities A Da Veiga, E Ochola, M Mujinga, K Padayachee, E Mwim, E Kritzinger, ... International Symposium on Human Aspects of Information Security and …, 2021 | 3 | 2021 |
An investigation of scalable anomaly detection techniques for a large network of wi-fi hotspots P Machaka, A Bagula Scalable Information Systems: 5th International Conference, INFOSCALE 2014 …, 2015 | 3 | 2015 |
Drought monitoring: A performance investigation of three machine learning techniques P Machaka Context-Aware Systems and Applications: Second International Conference …, 2014 | 3 | 2014 |
A highly scalable monitoring tool for wi-fi networks P Machaka, A Bagula, N De Wet 2012 IEEE 1st International Symposium on Wireless Systems (IDAACS-SWS), 102-107, 2012 | 2 | 2012 |
Preemptive performance monitoring of a large network of Wi-Fi Hotspots: an artificial immune system P Machaka, A Bagula International Conference on Wired/Wireless Internet Communications, 494-504, 2011 | 2 | 2011 |
Databases–personal information management R Kolekta, J Baboo, P Machaka, G Chandran | 1 | 2012 |
Check for updates A Reference Point for Designing a Cybersecurity Curriculum for Universities A da Veiga, E Ochola, M Mujinga, K Padayachee, E Mwim, E Kritzinger, ... Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 …, 2021 | | 2021 |
Data Mining Techniques for Distributed Denial of Service Attacks Detection in the Internet of Things P Machaka, F Nelwamondo | | 2020 |
Situation recognition using soft computing techniques P Machaka | | 2012 |
A Comparative Evaluation of Business Intelligence Technologies with Application to Product Profiling T Mabande, JK Balikuddembe, A Bagula, P Machaka Bio-Inspired Models of Networks, Information, and Computing Systems: 6th …, 2012 | | 2012 |