Zobrazeno 1 - 10
of 23
pro vyhledávání: '"ALESE, Boniface Kayode"'
Publikováno v:
Open Computer Science, Vol 12, Iss 1, Pp 142-153 (2022)
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails. With encryption being the dominant method of cloud data security, the advent o
Externí odkaz:
https://doaj.org/article/f181022ee2754521840484dca754efb6
Autor:
Junior Gabriel Arome, Alese Boniface Kayode, Adetunmbi Adebayo Olusola, Adewale Olumide Sunday, Sarumi Oluwafemi Abimbola
Publikováno v:
Open Computer Science, Vol 9, Iss 1, Pp 292-298 (2019)
Security (privacy, confidentiality and integrity) of pre-electoral, electoral and post electoral phases of the electioneering process is fundamental to the success of Electronic Voting (E-Voting) Systems. Crystography, which is the combination of cry
Externí odkaz:
https://doaj.org/article/9e024da7785e4974bc9fd5d4f7297f3e
Object Detection in Artisanal Small-Scale Gold Mining Environments using a Modified YOLOv4 Algorithm
Publikováno v:
International Journal of Computer Applications. 183:36-49
Publikováno v:
Communications on Applied Electronics. 7:9-18
Autor:
Olasehinde Olayemi Oladimeji, Alese Boniface Kayode, Adetunmbi Adebayo Olusola, Aladesote Olomi Isaiah
Publikováno v:
International Journal on Cyber Situational Awareness. 5:26-48
This paper reviewed the secure characteristics of mobile devices that can use wireless networks almost anywhere and anytime by using one or more wireless network technologies. These technologies enable the use of infrastructur ed networks and ad-hoc
Publikováno v:
Communications and Network. 13:68-78
With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention have become important in a distri
Autor:
Alese Boniface Kayode, Adekunle Adewale Uthman, Adewale Olumide Sunday, Alowolodu Olufunso Dayo
Publikováno v:
Volume 5 - 2020, Issue 8 - August. 5:1226-1229
Various cases of leakage of sensitive files such as confidential report and privacy documents of customers and staff have been reported mistakenly sent via email, leaked through unprotected USB Sticks and mobile devices. Multi-agent systems have expe
Publikováno v:
Annals. Computer Science Series; 2021, Vol. 19 Issue 1, p26-36, 11p
Publikováno v:
ICITST
Global System for Mobile communications (GSM) telephony has great impact in cellular communication technology because of its ability to accomodate more subscribers than the analog telephone. As a result, many calls are now on the network to seize the
Publikováno v:
ICITST
The computer game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions within the network. Like attack-graph-based model checking, the goal of an anti