Author:Khutlang, Rethabile; Machaka, Pheeha; Singh, Ann; Nelwamondo, Fulufhelo VDate:Aug 2017Biometric fingerprint scanners scan the external skin's features onto a 2-D image. The performance of the automatic fingerprint identification system suffers first and foremost if the finger skin is wet, worn out or a fake fingerprint is used. ...Read more
Author:Machaka, Pheeha; McDonald, Andre M; Nelwamondo, Fulufhelo V; Bagula, ADate:Nov 2015The paper presents the threats that are present in Internet of Things (IoT) systems and how they can be used to perpetuate a large scale DDoS attack. The paper investigates how the Cumulative Sum (CUSUM) algorithm can be used to detect a DDoS ...Read more