Anitta Patience Namanya

Learn More
Cognitive Radio Networks have been proposed to solve the problem of overcrowded unlicensed spectrum by using the cognitive ability built in software radios to utilise the underutilised licensed channel when the licensed users are not using it. Successful results from the research community have led to its application to wireless technologies like Ad Hoc(More)
Cyber attack is a sensitive issue in the world of Internet security. Governments and business organisations around the world are providing enormous effort to secure their data. They are using various types of tools and techniques to keep the business running, while adversaries are trying to breach security and send malicious software such as botnets,(More)
Fuzzy hashing is a known technique that has been adopted to speed up malware analysis processes. However, Hashing has not been fully implemented for malware detection because it can easily be evaded by applying a simple obfuscation technique such as packing. This challenge has limited the usage of hashing to triaging of the samples based on the percentage(More)
  • 1