Search Results - "Alese, Boniface Kayode"
-
1
Post-quantum cryptography-driven security framework for cloud computing
Published in Open computer science (30-03-2022)“…Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data…”
Get full text
Journal Article -
2
Post-Quantum Crystography System for Secure Electronic Voting
Published in Open computer science (16-10-2019)“…Security (privacy, confidentiality and integrity) of pre-electoral, electoral and post electoral phases of the electioneering process is fundamental to the…”
Get full text
Journal Article -
3
Predictive model of power generation using Long Short Term Memory on hydrological data
Published in 2019 IEEE PES/IAS PowerAfrica (01-08-2019)“…The level of Small Hydro Power (SHP) development in Nigeria is spreading over many river basins and also various unexploited SHP sites discovered which can…”
Get full text
Conference Proceeding -
4
DGM approach to network attacker and defender strategies
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01-12-2013)“…The computer game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent…”
Get full text
Conference Proceeding -
5
Towards Preserving the Confidentiality of Information in a Local Area Network (LAN) Messaging System
Published in Journal of applied computer science & mathematics (01-01-2013)“…Messaging system remains preeminent as themedium of official communication. The fear of confidentialitybeing breached has led many organizations in…”
Get full text
Journal Article -
6
A Multi-layer Stack Ensemble Approach to Improve Intrusion Detection System's Prediction Accuracy
Published in 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) (08-12-2020)“…Intrusion is a series of activities that violate an organisation's existing security goals and procedures. Hence, an Intrusion Detection System (IDS) should be…”
Get full text
Conference Proceeding -
7
Graphical analysis of captured network packets for detection of suspicious network nodes
Published in 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) (01-06-2020)“…The advent of the Internet has yielded the rapid development of Information Technology related applications over the past two decades. Most organizations have…”
Get full text
Conference Proceeding -
8
Statistical evaluation of the impact of ICT on Nigerian universities
Published in International journal of education and development using information and communication technology (01-04-2012)“…This paper proposes twenty-four performance indices that were freely considered by the authors as relevant for the conceptualization and evaluation of the…”
Get full text
Journal Article -
9
Optimised Privacy Model for Cloud Data
Published in 2021 16th International Conference on Computer Science & Education (ICCSE) (17-08-2021)“…Data security in the cloud has a been major issue upon the inception of cloud computing, frameworks have been proposed and implemented yet data breach…”
Get full text
Conference Proceeding -
10
Design of a Customer-Centric Surveillance System for ATM Banking Transactions using Remote Certification Technique
Published in 2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA) (23-02-2021)“…Automated Teller Machine (ATM) is a major tool for electronic banking (e-Banking). It enables the availability of banking services anytime and anywhere…”
Get full text
Conference Proceeding -
11
A prosodic Text-to-Speech system for Yorùbá language
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01-12-2013)“…We reviewed prosody realization in Text-to-Speech (TTS) applications. Standard Yoruba (SY) was considered alongside. Our review showed that the language is…”
Get full text
Conference Proceeding -
12
Multi-level access priority channel allocation strategies in Global System for Mobile communications (GSM) networks
Published in The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014) (01-12-2014)“…Global System for Mobile communications (GSM) telephony has great impact in cellular communication technology because of its ability to accomodate more…”
Get full text
Conference Proceeding -
13
Risk analysis in cyber situation awareness using Bayesian approach
Published in 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) (01-06-2015)“…The unpredictable cyber attackers and threats have to be detected in order to determine the outcome of risk in a network environment. This work develops a…”
Get full text
Conference Proceeding -
14
Development of cyber situation awareness model
Published in 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) (01-06-2015)“…This study designed and simulated cyber situation awareness model for gaining experience of cyberspace condition. This was with a view to timely detecting…”
Get full text
Conference Proceeding