
Jema David Ndibwile- Doctor of Engineering (Cyber Security)
- Assistant Professor at Carnegie Mellon University
Jema David Ndibwile
- Doctor of Engineering (Cyber Security)
- Assistant Professor at Carnegie Mellon University
Assistant Professor
About
16
Publications
34,662
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
169
Citations
Introduction
Working on Phishing Countermeasures,
The Psychology of cybersecurity,
Network security,
Ethical Hacking,
Digital Forensic,
Military Intelligence
Skills and Expertise
Current institution
Additional affiliations
October 2014 - September 2015
Education
September 2016 - December 2019
Nara Institute of Science and Technology
Field of study
- Cybersecurity
Publications
Publications (16)
Locally made agricultural machines have proven to elevate the life of many small-scale farmers, which has an increasing need to incorporate machine drives and controls to ease operations, using the Internet of Things (IoT) basics in tandem with motor designs and available off-the-shelf single board computer and development board in Raspberry Pi and...
In today’s communications, Short Message Service (SMS) and Internet protocol-based messaging systems are the most widely used channels. These services are currently the target of an unprecedented number of threats due to their rising appeal. Some spammers have more nefarious motives, even though most spam stems from businesses seeking to promote th...
Recently, phishing attacks have been increasing tremendously, and attackers discover new techniques every day to deceive users. With the advancement of technology, teenagers are considered the most technologically advanced generation, having grown up with the availability of the internet and mobile devices. However, as end-users, they are also cons...
A micro-controller-based technology has been developed for monitoring and controlling the water quality and quantity in dam reservoirs by using various sensors. This system is able to automatically detect and measure the changes in water and turbidity levels of incoming water for hydropower production. In this project, an Arduino UNO microcontrolle...
Network spoofing is becoming a common attack in wireless networks. The trend is going high due to an increase in Internet users. Similarly, there is a rapid growth of numbers in mobile devices in the working environments and on most official occasions. The trends pose a huge threat to users since they become the prime target of attackers. More unfo...
Due to the massive adoption of mobile money in Sub-Saharan countries, the global transaction value of mobile money exceeded $2 billion in 2021. Projections show transaction values will exceed $3 billion by the end of 2022, and Sub-Saharan Africa contributes half of the daily transactions. SMS (Short Message Service) phishing cost corporations and i...
Over the last two decades (2000-2020), the Internet has rapidly evolved, resulting in symmetrical and asymmetrical Internet consumption patterns and billions of users worldwide. With the immense rise of the Internet, attacks and malicious behaviors pose a huge threat to our computing environment. Brute-force attack is among the most prominent and c...
Billions of smartphones, globally, are running out-of-date Operating Systems (OS) which make them vulnerable to cyberattacks. Behaviours of users in updating their OS vary between different geographic locations considering various demographic factors. For instance, developing countries have a very different stance compared to developed ones on how...
Billions of smartphones and their users are vulnerable to various cyber-attacks such as phishing, man-in-the-middle, and malware. Among notable reasons for these vulnerabilities are the lack of cybersecurity knowledge, lack of effective cybersecurity legislation, sociocultural, socioeconomic and mainly outdated (obsolete) software applications such...
Phishing attacks have been persistent for more than two decades despite mitigation efforts from academia and industry. We believe that users fall victim to attacks not only because of lack of knowledge and awareness, but also because they are not attentive enough to security indicators and visual abnormalities on the webpages they visit. This is al...
Application layer Distributed Denial of Service (DDoS) attacks are among the deadliest kinds of attacks that have significant impact on destination servers and networks due to their ability to be launched with minimal computational resources to cause an effect of high magnitude. Commercial and government Web servers have become the primary target o...
Application layer Distributed Denial of Service (DDoS) attacks are among the deadliest kinds of attacks that have significant impact on destination servers and networks due to their ability to be launched with minimal computational resources to cause an effect of high magnitude. Commercial and government Web servers have become the primary target o...
Questions
Questions (2)
I am looking for a free online tool/script to get a list of websites from a specific country that are using a specific CMS (wordpress or drupal etc.). The ones am familiar with are paid ver tools like rescan.io, wappalyzer and webspotter for example. If you have some ideas please share.
Thanks in advance.
If anyone knows any software (free or paid) that can send a custom notification alert to any device (especially) baring a public IP address, please let me know.
Thanks in advance.