Cybersecurity Career Requirements: A Literature Review
M Nkongolo, N Mennega, I van Zyl - arXiv preprint arXiv:2306.09599, 2023 - arxiv.org
This study employs a systematic literature review approach to identify the requirements of a
career as a cybersecurity professional. It aims to raise public awareness regarding …
career as a cybersecurity professional. It aims to raise public awareness regarding …
News Classification and Categorization with Smart Function Sentiment Analysis
M Nkongolo Wa Nkongolo - International Journal of Intelligent …, 2023 - Wiley Online Library
Search engines are tools used to find information on the Internet. Since the web has a
plethora of websites, the engine queries the majority of active sites and builds a database …
plethora of websites, the engine queries the majority of active sites and builds a database …
Data protection for data privacy-a south african problem?
V Darwin, M Nkongolo - arXiv preprint arXiv:2306.09934, 2023 - arxiv.org
This study proposes a comprehensive framework for enhancing data security and privacy
within organizations through data protection awareness. It employs a quantitative method …
within organizations through data protection awareness. It employs a quantitative method …
Machine Learning-based Enhanced Deep Packet Inspection for IP Packet Priority Classification with Differentiated Services Code Point for Advance Network …
FA Khan, AA Ibrahim - Journal of Telecommunication, Electronic …, 2024 - jtec.utem.edu.my
In modern networking, the efficient prioritization and classification of network traffic is
paramount to ensure optimal network performance and optimization. This study presents an …
paramount to ensure optimal network performance and optimization. This study presents an …
Fuzzy feature selection with key-based cryptographic transformations
M Nkongolo - arXiv preprint arXiv:2306.09583, 2023 - arxiv.org
In the field of cryptography, the selection of relevant features plays a crucial role in
enhancing the security and efficiency of cryptographic algorithms. This paper presents a …
enhancing the security and efficiency of cryptographic algorithms. This paper presents a …
Enhancing search engine precision and user experience through sentiment-based polysemy resolution
M Nkongolo - arXiv preprint arXiv:2311.01895, 2023 - arxiv.org
With the proliferation of digital content and the need for efficient information retrieval, this
study's insights can be applied to various domains, including news services, e-commerce …
study's insights can be applied to various domains, including news services, e-commerce …
Using ARIMA to Predict the Expansion of Subscriber Data Consumption
MW Nkongolo - arXiv preprint arXiv:2404.15095, 2024 - arxiv.org
This study discusses how insights retrieved from subscriber data can impact decision-
making in telecommunications, focusing on predictive modeling using machine learning …
making in telecommunications, focusing on predictive modeling using machine learning …
Data protection psychology using game theory
M Nkongolo, J Sewnath - arXiv preprint arXiv:2402.07905, 2024 - arxiv.org
The research aims to explore how individuals perceive and interact with data protection
practices in an era of increasing reliance on technology and the widespread availability of …
practices in an era of increasing reliance on technology and the widespread availability of …
Assessing Cyclostationary Malware Detection via Feature Selection and Classification
M Nkongolo - arXiv preprint arXiv:2308.15237, 2023 - arxiv.org
Cyclostationarity involves periodic statistical variations in signals and processes, commonly
used in signal analysis and network security. In the context of attacks, cyclostationarity helps …
used in signal analysis and network security. In the context of attacks, cyclostationarity helps …
Ransomware Detection and Classification Using Random Forest: A Case Study with the UGRansome2024 Dataset
P Azugo, H Venter, MW Nkongolo - arXiv preprint arXiv:2404.12855, 2024 - arxiv.org
Cybersecurity faces challenges in identifying and mitigating ransomware, which is important
for protecting critical infrastructures. The absence of datasets for distinguishing normal …
for protecting critical infrastructures. The absence of datasets for distinguishing normal …