Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Oluwafemi Olukoya"'
Autor:
Ryan Mcconkey, Oluwafemi Olukoya
Publikováno v:
IEEE Access, Vol 12, Pp 1-22 (2024)
Data and privacy laws, such as the GDPR, require mobile apps that collect and process the personal data of their citizens to have a legally-compliant policy. Since these mobile apps are hosted on app distribution platforms such as Google Play Store a
Externí odkaz:
https://doaj.org/article/4a1a7cb7f94b452085b6a20fd36f915e
Publikováno v:
Machine Learning with Applications, Vol 14, Iss , Pp 100503- (2023)
Voice biometric authentication is increasingly gaining adoption in organisations with high-volume identity verifications and for providing access to physical and other virtual spaces. In this form of authentication, the user’s identity is verified
Externí odkaz:
https://doaj.org/article/d612fd85851c4e66a5efcb85fff71481
Autor:
Michal Kida, Oluwafemi Olukoya
Publikováno v:
IEEE Access, Vol 11, Pp 1148-1165 (2023)
Recent years have seen a rise in state-sponsored malware. Advanced Persistent Threat groups (APTs) have been waging a covert war with little repercussions due to the clandestine nature of cyberconflict. For sanctions to be imposed, malware attributio
Externí odkaz:
https://doaj.org/article/127133565bc5496c9e0aeb08f82edab2
Autor:
Oluwafemi Olukoya
Publikováno v:
Olukoya, O 2022, ' Assessing frameworks for eliciting privacy & security requirements from laws and regulations ', Computers & Security, vol. 117, 102697 . https://doi.org/10.1016/j.cose.2022.102697
The processing of personal data has become a prominent concern for stakeholders when selecting software or service providers to serve their needs. Different laws and legislation have been introduced to standardize and strengthen data protection polic
Autor:
Oluwafemi Olukoya
Publikováno v:
Olukoya, O 2021, ' Distilling blockchain requirements for digital investigation platforms ', Journal of Information Security and Applications, vol. 62, 102969 . https://doi.org/10.1016/j.jisa.2021.102969
When handling a security incident, there is a lot of information that needs to be stored, processed, and analyzed. As a result of the volume of information and the necessity to deal with a security incident investigation promptly, different forensic