Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Iorliam, Aamo"'
Protecting a fingerprint database against attackers is very vital in order to protect against false acceptance rate or false rejection rate. A key property in distinguishing fingerprint images is by exploiting the characteristics of these different t
Externí odkaz:
http://arxiv.org/abs/2201.01699
Terrorism is one of the most life-challenging threats facing humanity worldwide. The activities of terrorist organizations threaten peace, disrupts progress, and halt the development of any nation. Terrorist activities in Nigeria in the last decades
Externí odkaz:
http://arxiv.org/abs/2109.11023
Autor:
Iorliam, Aamo
Tampering of biometric samples is becoming an important security concern. Attacks can occur in behavioral modalities (e.g. keyboard stroke) as well. Besides biometric data, other important security concerns are related to network traffic data on the
Externí odkaz:
http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.701579
Autor:
Iorliam, Aamo, Tirunagari, Santosh, Ho, Anthony T. S., Li, Shujun, Waller, Adrian, Poh, Norman
Statistical characteristics of network traffic have attracted a significant amount of research for automated network intrusion detection, some of which looked at applications of natural statistical laws such as Zipf's law, Benford's law and the Paret
Externí odkaz:
http://arxiv.org/abs/1609.04214
Autor:
Iorliam, Aamo
Publikováno v:
Sakarya University Journal of Computer & Information Sciences (SAUCIS); Dec2023, Vol. 6 Issue 3, p218-225, 8p
Publikováno v:
International Journal of Information Technology; 20230101, Issue: Preprints p1-18, 18p
Severe outbreaks of infectious disease occur throughout the world with some reaching the level of an international pandemic: Coronavirus (COVID-19) is the most recent to do so. As such pandemics cause extensive loss of lives, hamper industrial operat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=sharePrprorg::c2ac7ad4337a9cef311364f0c719af0e
Autor:
Iorliam Aamo, Shangbum F. Caleb
Publikováno v:
Journal of Information Security. :240-256
Tampering of biometric data has attracted a great deal of attention recently. Furthermore, there could be an intentional or accidental use of a particular biometric sample instead of another for a particular application. Therefore, there exists a nee