Zobrazeno 1 - 10
of 69
pro vyhledávání: '"Richard Adeyemi"'
Publikováno v:
IEEE Access, Vol 10, Pp 19469-19480 (2022)
Securing digital evidence is a key factor that contributes to evidence admissibility during digital forensic investigations, particularly in establishing the chain of custody of digital evidence. However, not enough is done to ensure that the environ
Externí odkaz:
https://doaj.org/article/8ce40ff7a3d548779c27224bdba0c8dc
Publikováno v:
Computers, Vol 12, Iss 10, p 201 (2023)
The growing sophistication of malware has resulted in diverse challenges, especially among security researchers who are expected to develop mechanisms to thwart these malicious attacks. While security researchers have turned to machine learning to co
Externí odkaz:
https://doaj.org/article/0e53686eab354937b895e7c6b608462e
Autor:
Arafat Al-Dhaqm, Richard Adeyemi Ikuesan, Victor R. Kebande, Shukor Abd Razak, George Grispos, Kim-Kwang Raymond Choo, Bander Ali Saleh Al-Rimy, Abdulrahman A. Alsewari
Publikováno v:
IEEE Access, Vol 9, Pp 152476-152502 (2021)
For reliable digital evidence to be admitted in a court of law, it is important to apply scientifically proven digital forensic investigation techniques to corroborate a suspected security incident. Mainly, traditional digital forensics techniques fo
Externí odkaz:
https://doaj.org/article/42e5dcde5c244180a3fced59c3e5f64d
Autor:
Arafat Al-Dhaqm, Shukor Abd Razak, David A. Dampier, Kim-Kwang Raymond Choo, Kamran Siddique, Richard Adeyemi Ikuesan, Abdulhadi Alqarni, Victor R. Kebande
Publikováno v:
IEEE Access, Vol 8, Pp 112846-112858 (2020)
Database forensic investigation (DBFI) is an important area of research within digital forensics. It's importance is growing as digital data becomes more extensive and commonplace. The challenges associated with DBFI are numerous, and one of the chal
Externí odkaz:
https://doaj.org/article/f451001e902e42f5a173ab388df24449
Autor:
Arafat Al-Dhaqm, Shukor Abd Razak, Richard Adeyemi Ikuesan, Victor R. Kebande, Kamran Siddique
Publikováno v:
IEEE Access, Vol 8, Pp 173359-173375 (2020)
Mobile Forensics (MF) field uses prescribed scientific approaches with a focus on recovering Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques. Consequently, increased proliferation, mobile-based services, and the ne
Externí odkaz:
https://doaj.org/article/fb8748199b51412cb5d8c5ab1c916f8f
Autor:
Arafat Al-Dhaqm, Shukor Abd Razak, Kamran Siddique, Richard Adeyemi Ikuesan, Victor R. Kebande
Publikováno v:
IEEE Access, Vol 8, Pp 145018-145032 (2020)
For every contact that is made in a database, a digital trace will potentially be left and most of the database breaches are mostly aimed at defeating the major security goals (Confidentiality, Integrity, and Authenticity) of data that reside in the
Externí odkaz:
https://doaj.org/article/dd930653dd814e41aa181f99a5927e71
Autor:
AlMutawa, Amna1 (AUTHOR) huwida.said@zu.ac.ae, Ikuesan, Richard Adeyemi2 (AUTHOR) richard.ikuesan@zu.ac.ae, Said, Huwida1 (AUTHOR)
Publikováno v:
Future Internet. Dec2024, Vol. 16 Issue 12, p437. 23p.
Cyber security is considered a necessity for anyone in todays modern world. Awareness of cyber security standards and best practices have become mandatory to safeguard ones child in this day and age. High schoolers today do not understand cyber secur
Externí odkaz:
http://arxiv.org/abs/2207.00820
Publikováno v:
17th International Conference on Cyber Warfare and Security, 03/2022
Ransomware attacks have increased significantly in recent years, causing great destruction and damage to critical systems and business operations. Attackers are unfailingly finding innovative ways to bypass detection mechanisms, whichencouraged the a
Externí odkaz:
http://arxiv.org/abs/2203.16871
The current global pandemic occasioned by the SARS-CoV-2 virus has been attributed, partially, to the growing range of cyber vises within the cyber ecosystem. One area of such impact is the increasing tendencies of cyber-bullying among students. Cybe
Externí odkaz:
http://arxiv.org/abs/2203.16869