<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Department of Computing Science and Information Technology (DCSIT)</title>
<link href="https://repository.cuk.ac.ke/handle/123456789/569" rel="alternate"/>
<subtitle>DCSIT</subtitle>
<id>https://repository.cuk.ac.ke/handle/123456789/569</id>
<updated>2026-04-05T14:09:45Z</updated>
<dc:date>2026-04-05T14:09:45Z</dc:date>
<entry>
<title>Unravelling DevOps Agile Methodologies: A Comprehensive Review of Recent Research</title>
<link href="https://repository.cuk.ac.ke/handle/123456789/1900" rel="alternate"/>
<author>
<name>Nyale, Duncan</name>
</author>
<author>
<name>Mbandu Angolo, Shem</name>
</author>
<id>https://repository.cuk.ac.ke/handle/123456789/1900</id>
<updated>2026-02-24T13:34:11Z</updated>
<published>2023-11-24T00:00:00Z</published>
<summary type="text">Unravelling DevOps Agile Methodologies: A Comprehensive Review of Recent Research
Nyale, Duncan; Mbandu Angolo, Shem
This study report offers a thorough analysis of current studies on DevOps Agile techniques. The study summarizes and dissects the major discoveries made in peer-reviewed literature, conference proceedings, and other academic publications. The article examines the most recent DevOps Agile practice trends and advances, as well as how they affect software development, testing, deployment, and operations. The analysis emphasizes the advantages of applying DevOps Agile approaches, including enhanced collaboration, faster time to market, and higher-quality software products. The paper also examines the challenges and potential limitations of DevOps Agile adoption, such as cultural resistance, lack of skills, and integration issues. Finally, the study concludes with recommendations for practical implications for software development teams and organizations seeking to implement DevOps Agile methodologies. The review provides valuable insights and guidance for researchers, practitioners, and decision-makers in the field of software engineering and information technology.
Review of DevOps and Agile methods
</summary>
<dc:date>2023-11-24T00:00:00Z</dc:date>
</entry>
<entry>
<title>Enhancing Cyber Security: The Role of  Networking, Coordination, and Trusted Information Sharing in Organizational Resilience</title>
<link href="https://repository.cuk.ac.ke/handle/123456789/1899" rel="alternate"/>
<author>
<name>Nyale, Duncan</name>
</author>
<author>
<name>Katila, Charles</name>
</author>
<id>https://repository.cuk.ac.ke/handle/123456789/1899</id>
<updated>2026-02-24T12:45:37Z</updated>
<published>2024-09-01T00:00:00Z</published>
<summary type="text">Enhancing Cyber Security: The Role of  Networking, Coordination, and Trusted Information Sharing in Organizational Resilience
Nyale, Duncan; Katila, Charles
Organizations must take proactive measures to strengthen their cybersecurity posture as cyber-attacks continue to develop and become more sophisticated. Networking, coordination, and the sharing of trustworthy information among entities and organizations have become essential tactics for achieving this goal. This article gives a general overview of how networking, coordination, and trusted information sharing can improve an organization's cybersecurity posture. It covers the most recent advancements and trends in this field and analyses the advantages, difficulties, and best practices for putting these ideas into effect. The article's conclusion emphasizes the necessity of a cooperative, all-encompassing strategy for cybersecurity that incorporates networking, coordination, and reliable information exchange.
Cybersecurity resilience through coordination and trusted information sharing
</summary>
<dc:date>2024-09-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>An Ensemble Machine Learning Based Algorithm to Enhance Detection of Zero-Day Attacks: A Comparative Review</title>
<link href="https://repository.cuk.ac.ke/handle/123456789/1894" rel="alternate"/>
<author>
<name>John Kavoi, Dominic</name>
</author>
<author>
<name>Jumaa Katila, Charles</name>
</author>
<author>
<name>Richard, Otieno Omollo</name>
</author>
<id>https://repository.cuk.ac.ke/handle/123456789/1894</id>
<updated>2026-02-20T12:00:57Z</updated>
<published>2025-07-01T00:00:00Z</published>
<summary type="text">An Ensemble Machine Learning Based Algorithm to Enhance Detection of Zero-Day Attacks: A Comparative Review
John Kavoi, Dominic; Jumaa Katila, Charles; Richard, Otieno Omollo
In the current technological landscape, a lot of risks are present due to the availability of existing and novel kinds of attacks. For these attacks to be countered, systems that identify all the variants without any false positives and false negatives are in high demand. The existence of traditional attack detection methods, such as the signature-based algorithms, has proven that they cannot spot new attacks. This is because they work based on a database that has signatures of attacks. The other methods of detecting attacks that have been explored in this study are the hybrid and machine learning methods for detecting zero-day attacks. In this research, we are coming up with an ensemble set of machine learning algorithms that identify novel and existing attacks in real time from an existing dataset. All of these concepts are mainly based on the Confidentiality, Integrity and Availability (CIA) triad. In order to come up with this, the main method of deployment to be used is the machine learning pipeline. The study has a firm foundation based on theorems such as Bayes and the fundamental principles of computational learning theory. This is composed of stages such as the identification, cleaning, analysis and feature engineering of the data. From there, the ensemble algorithm will be implemented, its accuracy measured and then tuned to improve its efficiency.
A research article published in the scientific research an academic publisher.
</summary>
<dc:date>2025-07-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>A Descriptive Analysis of Security Threats and  Attacks in Public Cloud Computing:  Safeguarding Data from Cyber Attacks.</title>
<link href="https://repository.cuk.ac.ke/handle/123456789/1893" rel="alternate"/>
<author>
<name>Orucho, Daniel Okari</name>
</author>
<author>
<name>Katila, Charles</name>
</author>
<author>
<name>Mandela, Ngaira</name>
</author>
<id>https://repository.cuk.ac.ke/handle/123456789/1893</id>
<updated>2026-02-20T08:46:34Z</updated>
<published>2025-08-01T00:00:00Z</published>
<summary type="text">A Descriptive Analysis of Security Threats and  Attacks in Public Cloud Computing:  Safeguarding Data from Cyber Attacks.
Orucho, Daniel Okari; Katila, Charles; Mandela, Ngaira
Cloud computing has revolutionized how organizations and individuals store, access, and interact with data, software, and computing resources. Public cloud platforms offer scalable, cost-efficient, and globally accessible services, often characterized by managed infrastructure and multi-tenancy. However, this technological advancement faces escalating cyber threats and sophisticated attack vectors such as Denial-of-Service (DoS), Man-in-the-Middle (MITM) attacks, data breaches, and insecure APIs. These threats compromise data integrity, availability, and confidentiality. This study employs a descriptive research methodology, supplemented by desktop analysis, to examine the evolving landscape of security threats in public cloud computing. It further evaluates mitigation strategies including encryption, access control, secure API management, and continuous monitoring, while highlighting persistent research gaps that demand attention for robust cloud security frameworks.
A research article published in the International Journal of Computer Science and Information Security (IJCSIS),
</summary>
<dc:date>2025-08-01T00:00:00Z</dc:date>
</entry>
</feed>
