Zobrazeno 1 - 10
of 94
pro vyhledávání: '"Richard Adeyemi"'
Autor:
AlMutawa, Amna1 (AUTHOR) huwida.said@zu.ac.ae, Ikuesan, Richard Adeyemi2 (AUTHOR) richard.ikuesan@zu.ac.ae, Said, Huwida1 (AUTHOR)
Publikováno v:
Future Internet. Dec2024, Vol. 16 Issue 12, p437. 23p.
Cyber security is considered a necessity for anyone in todays modern world. Awareness of cyber security standards and best practices have become mandatory to safeguard ones child in this day and age. High schoolers today do not understand cyber secur
Externí odkaz:
http://arxiv.org/abs/2207.00820
Publikováno v:
17th International Conference on Cyber Warfare and Security, 03/2022
Ransomware attacks have increased significantly in recent years, causing great destruction and damage to critical systems and business operations. Attackers are unfailingly finding innovative ways to bypass detection mechanisms, whichencouraged the a
Externí odkaz:
http://arxiv.org/abs/2203.16871
The current global pandemic occasioned by the SARS-CoV-2 virus has been attributed, partially, to the growing range of cyber vises within the cyber ecosystem. One area of such impact is the increasing tendencies of cyber-bullying among students. Cybe
Externí odkaz:
http://arxiv.org/abs/2203.16869
Autor:
Kebande, Victor R., Karie, Nickson M., Ikuesan, Richard Adeyemi, Al-Ghushami, Abdullah, Venter, H. S.
Publikováno v:
2020 INSPEC Accession Number: 19300268 Electronic ISBN: 978-1-7281-3306-5 Print on Demand(PoD) ISBN: 978-1-7281-3307-2
The threats posed by botnets in the cyberspace continue to grow each day and it has become very hard to detect or infiltrate the cynicism of bots. This, is owing to the fact, that, the botnet developers each day, keep changing the propagation and att
Externí odkaz:
http://arxiv.org/abs/2004.08715
Publikováno v:
In Procedia Computer Science 2023 219:211-219
Publikováno v:
IEEE Access, Vol 10, Pp 19469-19480 (2022)
Securing digital evidence is a key factor that contributes to evidence admissibility during digital forensic investigations, particularly in establishing the chain of custody of digital evidence. However, not enough is done to ensure that the environ
Externí odkaz:
https://doaj.org/article/8ce40ff7a3d548779c27224bdba0c8dc
Publikováno v:
Computers, Vol 12, Iss 10, p 201 (2023)
The growing sophistication of malware has resulted in diverse challenges, especially among security researchers who are expected to develop mechanisms to thwart these malicious attacks. While security researchers have turned to machine learning to co
Externí odkaz:
https://doaj.org/article/0e53686eab354937b895e7c6b608462e
Autor:
Arafat Al-Dhaqm, Richard Adeyemi Ikuesan, Victor R. Kebande, Shukor Abd Razak, George Grispos, Kim-Kwang Raymond Choo, Bander Ali Saleh Al-Rimy, Abdulrahman A. Alsewari
Publikováno v:
IEEE Access, Vol 9, Pp 152476-152502 (2021)
For reliable digital evidence to be admitted in a court of law, it is important to apply scientifically proven digital forensic investigation techniques to corroborate a suspected security incident. Mainly, traditional digital forensics techniques fo
Externí odkaz:
https://doaj.org/article/42e5dcde5c244180a3fced59c3e5f64d
Publikováno v:
Proceedings of the European Conference on Cyber Warfare & Security; 2023, p73-82, 10p