Follow
Pheeha Machaka
Pheeha Machaka
University of South Africa, College of Science,Engineering & Technology, School of Computing
Verified email at unisa.ac.za
Title
Cited by
Cited by
Year
Using exponentially weighted moving average algorithm to defend against DDoS attacks
P Machaka, A Bagula, F Nelwamondo
2016 Pattern recognition association of South Africa and robotics and …, 2016
222016
Using the cumulative sum algorithm against distributed denial of service attacks in internet of things
P Machaka, A McDonald, F Nelwamondo, A Bagula
Context-Aware Systems and Applications: 4th International Conference, ICCASA …, 2016
192016
Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey
P Machaka, F Nelwamondo
Securing the Internet of Things: Concepts, Methodologies, Tools, and …, 2020
52020
An investigation of scalable anomaly detection techniques for a large network of wi-fi hotspots
P Machaka, A Bagula
Scalable Information Systems: 5th International Conference, INFOSCALE 2014 …, 2015
32015
Drought monitoring: A performance investigation of three machine learning techniques
P Machaka
Context-Aware Systems and Applications: Second International Conference …, 2014
32014
Monitoring of a large Wi-Fi hotspots network: performance investigation of soft computing techniques
P Machaka, T Mabande, A Bagula
Bio-Inspired Models of Networks, Information, and Computing Systems: 6th …, 2012
32012
Modelling DDoS Attacks in IoT Networks using Machine Learning
P Machaka, O Ajayi, H Maluleke, F Kahenga, A Bagula, K Kyamakya
arXiv preprint arXiv:2112.05477, 2021
22021
Statistical properties and modelling of DDoS attacks
P Machaka, A Bagula
Context-Aware Systems and Applications, and Nature of Computation and …, 2021
22021
A highly scalable monitoring tool for wi-fi networks
P Machaka, A Bagula, N De Wet
2012 IEEE 1st International Symposium on Wireless Systems (IDAACS-SWS), 102-107, 2012
22012
Preemptive performance monitoring of a large network of Wi-Fi Hotspots: an artificial immune system
P Machaka, A Bagula
Wired/Wireless Internet Communications: 9th IFIP TC 6 International …, 2011
22011
Databases–personal information management
R Kolekta, J Baboo, P Machaka, G Chandran
12012
A Reference Point for Designing a Cybersecurity Curriculum for Universities
E Mwim, E Kritzinger, M Loock, P Machaka
Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 …, 2021
2021
A Reference Point for Designing a Cybersecurity Curriculum for Universities
A Da Veiga, E Ochola, M Mujinga, K Padayachee, E Mwim, E Kritzinger, ...
Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 …, 2021
2021
Data Mining Techniques for Distributed Denial of Service Attacks Detection in the Internet of Things
P Machaka, F Nelwamondo
2020
Situation recognition using soft computing techniques
P Machaka
University of Cape Town, 2012
2012
A Comparative Evaluation of Business Intelligence Technologies with Application to Product Profiling
T Mabande, JK Balikuddembe, A Bagula, P Machaka
Bio-Inspired Models of Networks, Information, and Computing Systems: 6th …, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–16