Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Olusola J. Adeniran"'
Autor:
Timothy M. Okediran, Olufunke R. Vincent, Abayomi O. Agbeyangi, Adebayo Abayomi-Alli, Olusola J. Adeniran
Publikováno v:
2022 5th Information Technology for Education and Development (ITED).
Autor:
Sanjay Misra, Temitope Elizabeth Abioye, Olusola J. Adeniran, Adio T. Akinwale, Oluwasefunmi 'Tale Arogundade
Publikováno v:
Journal of Software: Evolution and Process. 32
Publikováno v:
SN Computer Science. 1
Security breaches have been observed in different dimensions in mobile payment system. The violation of user’s privacy is a common phenomenon in mobile payment transactions. This study presents an improved security scheme for a mobile payment syste
Autor:
Abiodun Muyideen Mustapha, Kayode Adesemowo, Friday Thomas Ibrahalu, Christianah Yetunde Alonge, Oluwasefunmi 'Tale Arogundade, Olusola J. Adeniran
Publikováno v:
2020 International Conference in Mathematics, Computer Engineering and Computer Science (ICMCECS).
Many information assets have been exposed to threats as a result of business owners not having access to an efficient model for classifying their information assets into appropriate security risk levels, required level of protection and priority. Man
Publikováno v:
Information Systems and e-Business Management. 16:155-185
Today’s business entities face an ever-growing number of laws and regulations due to recent high profile business scandals and failures. Small and medium scale enterprises (SMSE) in developing countries do not have an efficient compliance checking
Publikováno v:
International Journal of Secure Software Engineering. 7:1-25
Resource allocation decisions can be enhanced by performing risk assessment during the early development phase. In order to improve and maintain the security of the Information System (IS, hereafter), there is need to build risk analysis model that c
Autor:
A. M. Mustapha, Oluwasefunmi 'Tale Arogundade, O. R. Vincent, Xiaohong Chen, Olusola J. Adeniran
Publikováno v:
2017 International Conference on Computing Networking and Informatics (ICCNI).
Despite the great benefits of cloud computing on businesses, some organizations have had to withdraw from its service due to incomplete compliance to conditions from standards, bodies, or Service Level Agreements which have led to their being penaliz
Publikováno v:
Open Geosciences, Vol 5, Iss 1, Pp 43-52 (2013)
The Mellin transform is a mathematical tool which has been applied in many areas of Mathematics, Physics and Engineering. Its application in Geophysics is in the computation of solution of potential problems for the determination of the mass as well
Publikováno v:
Journal of Computing and Information Technology. 15:227
A Site Security Officer (SSO) who is a network security staff that responds to alarms from an Intrusion Detection System (IDS), is always faced with the critical problem of low response time when the network becomes big. Even a skilled SSO is hard-pr