Modelling Cybersecurity Knowledge and Attitudes of Online Users

Abstract: Individuals and organizations are persistently being exploited by cybercriminals. With the increased dependence on the Internet, cyberattacks have become even more prominent. However, many of the Internet users under prioritize their online safety, and fall victims. Their unawareness and negligence of cybersecurity poses devastating consequences. It is thus essential to analyze the factors affecting

Human Factors influencing Compliance to Cyber Security Practices by Employees of Public Universities in Southeast Nigeria

Abstract: The increasing use of technology in workplaces has led to a rise in cyber threats, making it essential for employees to have adequate knowledge and skills to ensure cyber safety. The study examined the human factors that influence the cyber security practices of employees in public universities in Southeast in Nigeria. The theory of

Phishing Detection: Performance Evaluation of Both Ensemble and Classical Machine Learning Models

Abstract: The majority of bank customers have switched to e-banking for their regular financial activities as a result of the development of technology and the rise of electronic commerce in global trade. The emergence of e-commerce has also attracted scammers looking to swindle bank customers, rendering e-commerce platforms vulnerable to a number of assaults, the

Development of a Botnet Management Model for Cyber Security Networks using Machine Learning Algorithm

Abstract: The negative effects of Botnet on the cyberspace cannot be overemphasized. A Botnet is a group of compromised computer systems that are connected to a central controller called a Botmaster. The Botmaster uses command and control (C&C) channels to manipulate Botnets. Devices which are connected to the internet are prone to getting infected by

Coverage Enhancement for Wireless Sensor Network Using Levy Flight Whale Optimization Algorithm

Abstract: WSNs is a collection of sensor nodes with the capacity of recognizing, physical changes from the environment such as pressure, wind, air pollution, temperature, humidity, forest fire detection, vibration and many others wirelessly among themselves. Coverage of a sensor node is one of the factors that affect the strength and reliability of wireless sensor

None-Distributed Mobility Assisted Sensor Deployment Algorithm in Wireless Sensor Networks

Abstract: Sensor nodes are deployed in oreder to observe the surrounding environment for some phenomena of interest in wireless sensor networks. The problem with observing such environments is covering entire area which reflects how well a region is monitored. The random distribution of sensor nodes caused by none-uniform deployment leads to coverage holes in the