Search Results - "Alese, Boniface Kayode"

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Post-quantum cryptography-driven security framework for cloud computing by Ukwuoma, Henry Chima, Arome, Gabriel, Thompson, Aderonke, Alese, Boniface Kayode

    Published in Open computer science (30-03-2022)
    “…Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data…”
    Get full text
    Journal Article
  2. 2

    Post-Quantum Crystography System for Secure Electronic Voting by Junior Gabriel, Arome, Alese, Boniface Kayode, Adetunmbi, Adebayo Olusola, Adewale, Olumide Sunday, Sarumi, Oluwafemi Abimbola

    Published in Open computer science (16-10-2019)
    “…Security (privacy, confidentiality and integrity) of pre-electoral, electoral and post electoral phases of the electioneering process is fundamental to the…”
    Get full text
    Journal Article
  3. 3

    Predictive model of power generation using Long Short Term Memory on hydrological data by Abidemi Bode, Moyinoluwa, Thompson, Aderonke Favour-Bethy, Kayode Alese, Boniface, Olurinde, Lafe

    Published in 2019 IEEE PES/IAS PowerAfrica (01-08-2019)
    “…The level of Small Hydro Power (SHP) development in Nigeria is spreading over many river basins and also various unexploited SHP sites discovered which can…”
    Get full text
    Conference Proceeding
  4. 4

    DGM approach to network attacker and defender strategies by Alese, Boniface Kayode, Babatunde, Iwasokun Gabriel, Israel, Haruna Danjuma

    “…The computer game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent…”
    Get full text
    Conference Proceeding
  5. 5

    Towards Preserving the Confidentiality of Information in a Local Area Network (LAN) Messaging System by Aderonke Favour-Bethy THOMPSON, Otasowie IYARE, Boniface Kayode ALESE

    “…Messaging system remains preeminent as themedium of official communication. The fear of confidentialitybeing breached has led many organizations in…”
    Get full text
    Journal Article
  6. 6

    A Multi-layer Stack Ensemble Approach to Improve Intrusion Detection System's Prediction Accuracy by Aryeh, Felix Larbi, Alese, Boniface Kayode

    “…Intrusion is a series of activities that violate an organisation's existing security goals and procedures. Hence, an Intrusion Detection System (IDS) should be…”
    Get full text
    Conference Proceeding
  7. 7

    Graphical analysis of captured network packets for detection of suspicious network nodes by Aryeh, Felix Larbi, Alese, Boniface Kayode, Olasehinde, Olayemi

    “…The advent of the Internet has yielded the rapid development of Information Technology related applications over the past two decades. Most organizations have…”
    Get full text
    Conference Proceeding
  8. 8

    Statistical evaluation of the impact of ICT on Nigerian universities by Babatunde, Iwasokun Gabriel, Kayode, Alese Boniface, Aderonke, Thompson, Ola, Aranuwa Felix

    “…This paper proposes twenty-four performance indices that were freely considered by the authors as relevant for the conceptualization and evaluation of the…”
    Get full text
    Journal Article
  9. 9

    Optimised Privacy Model for Cloud Data by Ukwuoma, Henry Chima, Junior, Arome Gabriel, Thompson, Aderonke, Alese, Boniface Kayode

    “…Data security in the cloud has a been major issue upon the inception of cloud computing, frameworks have been proposed and implemented yet data breach…”
    Get full text
    Conference Proceeding
  10. 10

    Design of a Customer-Centric Surveillance System for ATM Banking Transactions using Remote Certification Technique by Popoola, Olugbemiga Solomon, Adetunmbi, Adebayo Olusola, Ugwu, Chukwuemeka Christian, Jimoh, Ibraheem Temitope, Alese, Kayode Boniface

    “…Automated Teller Machine (ATM) is a major tool for electronic banking (e-Banking). It enables the availability of banking services anytime and anywhere…”
    Get full text
    Conference Proceeding
  11. 11

    A prosodic Text-to-Speech system for Yorùbá language by Akinwonmi, Akintoba Emmanuel, Alese, Boniface Kayode

    “…We reviewed prosody realization in Text-to-Speech (TTS) applications. Standard Yoruba (SY) was considered alongside. Our review showed that the language is…”
    Get full text
    Conference Proceeding
  12. 12

    Multi-level access priority channel allocation strategies in Global System for Mobile communications (GSM) networks by Moses, Kuboye Bamidele, Kayode, Alese Boniface, Sunday, Adewale Olumide

    “…Global System for Mobile communications (GSM) telephony has great impact in cellular communication technology because of its ability to accomodate more…”
    Get full text
    Conference Proceeding
  13. 13

    Risk analysis in cyber situation awareness using Bayesian approach by Bode, Moyinoluwa Abidemi, Alese, Boniface Kayode, Oluwadare, Samuel Adebayo, Thompson, Aderonke Favour-Bethy

    “…The unpredictable cyber attackers and threats have to be detected in order to determine the outcome of risk in a network environment. This work develops a…”
    Get full text
    Conference Proceeding
  14. 14

    Development of cyber situation awareness model by Adenusi, Dauda, Kuboye, Bamidele Moses, Alese, Boniface Kayode, Thompson, Aderonke Favour-Bethy

    “…This study designed and simulated cyber situation awareness model for gaining experience of cyberspace condition. This was with a view to timely detecting…”
    Get full text
    Conference Proceeding