Author:Danny, MN; Kogeda, OP; Mtsweni, Jabu SDate:Nov 2016In Social Networking Sites (SNSs), users tend to accept friend requests and share their personal information based on intuitive trust levels. Mistakenly trusting and sharing private information with malicious users may lead to a wide variety ...Read more
Author:Fleming, GJ; Van der Merwe, Martina R; Mcferren, GADate:2007Cholera (Vibrio cholerae) is endemic in southern Africa and frequently breaks out in epidemics along the eastern seaboard. Extensive resources are directed at combating cholera yet it remains a significant problem. Limited resources could ...Read more
Author:Mkuzangwe, Nenekazi NP; Nelwamondo, Fulufhelo VDate:Apr 2017Fuzzy logic is one of the powerful tools for reasoning under uncertainty and since uncertainty is an intrinsic characteristic of intrusion analysis, Fuzzy logic is therefore an appropriate tool to use to analyze intrusions in a Network. This ...Read more
Author:Nyirenda, CN; Dawoud, DSDate:Sep 2007In 802.11 Wireless Local Area Networks, the wired and the wireless interfaces of the Access Point are characterized by the disparity in channel capacity. This presents a significant bottleneck for traffic flowing from the wired network to the ...Read more