Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Olawale Surajudeen Adebayo"'
Publikováno v:
Transactions on Networks and Communications. 8:31-44
Tracking of computer network system attacks is a proactive measure to protect against attacks on data, that are basically encrypted for confidential security reasons, while in transit on the computer information channel. Cyber security threat continu
Autor:
Shefiu Olusegun Ganiyu, Joel Sokoyebom Anyam, Olawale Surajudeen Adebayo, Sule Ajiboye Salawu
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030691424
ICTA
ICTA
This research investigates popular messaging applications’ traffic in other to assess the security or vulnerability of communication on those applications. The experiment was carried out in a Local Area Network. Wireshark, NetworkMiner and Netwitne
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::73bb62276e49cb5952795677902a7583
https://doi.org/10.1007/978-3-030-69143-1_35
https://doi.org/10.1007/978-3-030-69143-1_35
Publikováno v:
2019 15th International Conference on Electronics, Computer and Computation (ICECCO).
Cloud Computing has witnessed tremendous growth in the last decades. Security and privacy of cloud data are two major concerns that have limited the growth and researches witnessed in the area of cloud computing. With Artificial Intelligence and Deep
Autor:
Nadim Rana, Shafi’i Muhammad Abdulhamid, Ismaila Idris, John K. Alhassan, Olawale Surajudeen Adebayo, Oluwafemi Osho, Maryam Shuaib
Publikováno v:
SN Applied Sciences. 1
Email has continued to be an integral part of our lives and as a means for successful communication on the internet. The problem of spam mails occupying a huge amount of space and bandwidth, and the weaknesses of spam filtering techniques which inclu
The usefulness of mobile phones nowadays has gone beyond making calls and sending text messages. In fact, most of applications available on desktop computer are presently easily accessible on mobile devices, especially smartphone based on Androids, i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cd5d32727916a8e2a4fe04f2a02b3e42
https://doi.org/10.4018/978-1-5225-7909-0.ch037
https://doi.org/10.4018/978-1-5225-7909-0.ch037
Publikováno v:
Security and Communication Networks, Vol 2019 (2019)
The incessant destruction and harmful tendency of malware on mobile devices has made malware detection an indispensable continuous field of research. Different matching/mismatching approaches have been adopted in the detection of malware which includ
Publikováno v:
i-manager’s Journal on Software Engineering. 13:7
Autor:
Damian Oshomah Ugiomoh, Shafi’i Muhammad Abdulhamid, Olawale Surajudeen Adebayo, Mohammed Danlami AbdulMalik
Publikováno v:
International Journal of Computer Network and Information Security. 5:9-18
Elections are believed to be the key pillars of democracy and voting is one of the electoral processes that ensure the sustenance of democracy in any civil society. In this paper, we developed an electronic voting system, which will eliminate rigging
Publikováno v:
International Journal of Computer Network and Information Security. 5:1-12
With the amount of available text data on the web growing rapidly, the need for users to search such information is dramatically increasing. Full text search engines and relational databases each have unique strengths as development tools but also ha
Publikováno v:
2014 4th World Congress on Information and Communication Technologies (WICT 2014).
Several machine learning techniques based on supervised learning have been adopted in the classification of malware. However, only supervised learning techniques have proofed insufficient for malware classification task. This paper presents a classif