Zobrazeno 1 - 10
of 66
pro vyhledávání: '"Aman Jantan"'
Publikováno v:
Journal of Information Science Theory and Practice, Vol 12, Iss 1 (2024)
An online social network is a platform that is continuously expanding, which enables groups of people to share their views and communicate with one another using the Internet. The social relations among members of the public are significantly improve
Externí odkaz:
https://doaj.org/article/1f141ea58071410d8552efbf0223a613
Publikováno v:
Journal of Information Science Theory and Practice, Vol 11, Iss 4 (2023)
Cybercrime is a significant threat to Internet users, involving crimes committed using computers or computer networks. The landscape of cyberspace presents a complex terrain, making the task of tracing the origins of sensitive data a formidable and o
Externí odkaz:
https://doaj.org/article/b34556ebebdc495a9af7d84136584f0f
Publikováno v:
IEEE Access, Vol 10, Pp 122501-122512 (2022)
Previous research on RFM (recency, frequency, and monetary value) models focused on only one type of user behavior data, i.e., the purchase behavior, without considering the interactions between users and items, such as clicking, favorite, and adding
Externí odkaz:
https://doaj.org/article/55c426db51a8484b83c8372edf760504
Autor:
Waheed Ali H. M. Ghanem, Sanaa Abduljabbar Ahmed Ghaleb, Aman Jantan, Abdullah B. Nasser, Sami Abdulla Mohsen Saleh, Amir Ngah, Arifah Che Alhadi, Humaira Arshad, Abdul-Malik H. Y. Saad, Abiodun Esther Omolara, Yousef A. Baker El-Ebiary, Oludare Isaac Abiodun
Publikováno v:
IEEE Access, Vol 10, Pp 76318-76339 (2022)
The staggering development of cyber threats has propelled experts, professionals and specialists in the field of security into the development of more dependable protection systems, including effective intrusion detection system (IDS) mechanisms whic
Externí odkaz:
https://doaj.org/article/8b0c18c2e28c4e3da478775a8e1bed6b
Publikováno v:
Journal of ICT, Vol 21, Iss 3 (2022)
Transport Layer Security (TLS) based malware is one of the most hazardous malware types, as it relies on encryption to conceal connections. Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted t
Externí odkaz:
https://doaj.org/article/3485fea27a6949b08a924813f6dab664
Publikováno v:
IEEE Access, Vol 8, Pp 130452-130475 (2020)
One of the most persistent challenges concerning network security is to build a model capable of detecting intrusions in network systems. The issue has been extensively addressed in uncountable researches and using various techniques, of which a comm
Externí odkaz:
https://doaj.org/article/33e5bb68b0cc4095a7efd460ab649f31
Autor:
Abiodun Esther Omolara, Aman Jantan, Oludare Isaac Abiodun, Kemi Victoria Dada, Humaira Arshad, Etuh Emmanuel
Publikováno v:
IEEE Access, Vol 7, Pp 100881-100898 (2019)
Communication security deals with attributes such as confidentiality, integrity, and availability. The current strategies used to achieve covertness of communication employs encryption. Encryption techniques minimize eavesdropping on the conversation
Externí odkaz:
https://doaj.org/article/61b65d73f6264523b56f9daef1f3e0c0
Autor:
Oludare Isaac Abiodun, Aman Jantan, Abiodun Esther Omolara, Kemi Victoria Dada, Abubakar Malah Umar, Okafor Uchenwa Linus, Humaira Arshad, Abdullahi Aminu Kazaure, Usman Gana, Muhammad Ubale Kiru
Publikováno v:
IEEE Access, Vol 7, Pp 158820-158846 (2019)
The era of artificial neural network (ANN) began with a simplified application in many fields and remarkable success in pattern recognition (PR) even in manufacturing industries. Although significant progress achieved and surveyed in addressing ANN a
Externí odkaz:
https://doaj.org/article/0612e932a6844953aa6a1d059b57cd88
Autor:
Oludare Isaac Abiodun, Aman Jantan, Abiodun Esther Omolara, Kemi Victoria Dada, Nachaat AbdElatif Mohamed, Humaira Arshad
Publikováno v:
Heliyon, Vol 4, Iss 11, Pp e00938- (2018)
This is a survey of neural network applications in the real-world scenario. It provides a taxonomy of artificial neural networks (ANNs) and furnish the reader with knowledge of current and emerging trends in ANN applications research and area of focu
Externí odkaz:
https://doaj.org/article/9881137d1f8648ac840b5fd0012fb4ed
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 17:61-74
Many applications today are using an encrypted channel to secure their communication and transactions. Though, their security is often challenged by adversaries such as Botnet. Botnet leverages the encrypted channel to launch attacks and amplify the