Modelling Emotional States for Enhanced Brainwave Based Authentication Systems

Abstract A developing biometric technique called brainwave authentication uses the distinctive electrical patterns produced by the human brain to identify a person. When it comes to security and durability, brainwave authentication surpasses standard biometrics as it utilizes an individual’s own neural signatures, rather than depending on exterior physical or behavioural traits. The proposed brainwave authentication

Minimising False Alarm Rate in Network Intrusion Detection System Model Using KNN Classifier and Chi-Square for Feature Selection

Abstract False alarms in network intrusion detection systems (NIDS) can lead to unnecessary and costly investigations and reduce the credibility of the system. Network intrusion detection systems (NIDS) are tools that monitor network traffic and detect malicious or anomalous behaviours. However, NIDS face many challenges, such as the high dimensionality of network data, class imbalance,

Internet of Things Intrusion Detection System Using Enhanced Deep Learning-based Feature Selection

Abstract The Internet of Things (IoT) has become an integral part of our daily lives, with the increasing usage of interconnected devices. However, with this increased connectivity comes the risk of security breaches and intrusions. To address this issue, many researchers have proposed intrusion detection systems (IDS) that utilize deep learning techniques. Therefore, this study

An End-To-End Encrypted Real-Time Multimedia Messaging Service System for Unicast and Multicast Communication

Abstract Communication is as old as mankind and is extremely vital to human survival. As time passed, humanity evolved, so did our tools and technologies. Now, in this fast-paced world, we live in, information must be transmitted securely, as fast as possible, and without transmission delays; hence the advent of real-time communication. However, security breaches

A Review of Open Source fully homophobic Encryption Libraries: Zama.ai Concrete Compiler, Applications and Vulnerability

Abstract Fully Homomorphic Encryption (FHE) represents a sophisticated cryptographic method that permits computations on encrypted data without the necessity for prior decryption. Substantial progress has been achieved in the realm of FHE and its application since 2015, yielding enhanced efficacy, heightened security, and augmented feasibility. The review paper critically evaluates diverse FHE schemes/libraries, and the

A Hybrid Cryptographic Algorithm for Web Security against Distributed Denial of Service Attacks

Abstract To prevent disruptions on the internet caused by distributed denial of service (DDoS), the study presents a hybrid cryptographic algorithm that enhances web security. To enhance security and mitigate the effects of DDoS attacks, the proposed algorithm combines symmetric and asymmetric encryption techniques with traffic analysis. First, Blowfish encryption is employed in the fast

Phishing Uniform Resource Locator Detection Using Machine Learning Methods

Abstract Phishing attacks are a serious threat to internet security because they can cause large financial losses and jeopardize user privacy. To overcome these obstacles, this research uses machine learning models to create an effective phishing URL detection system. The research includes an in-depth examination of different phishing tactics, the complexity of phishing websites, and

Modelling Cybersecurity Knowledge and Attitudes of Online Users

Abstract: Individuals and organizations are persistently being exploited by cybercriminals. With the increased dependence on the Internet, cyberattacks have become even more prominent. However, many of the Internet users under prioritize their online safety, and fall victims. Their unawareness and negligence of cybersecurity poses devastating consequences. It is thus essential to analyze the factors affecting

Human Factors influencing Compliance to Cyber Security Practices by Employees of Public Universities in Southeast Nigeria

Abstract: The increasing use of technology in workplaces has led to a rise in cyber threats, making it essential for employees to have adequate knowledge and skills to ensure cyber safety. The study examined the human factors that influence the cyber security practices of employees in public universities in Southeast in Nigeria. The theory of