Phishing Detection: Performance Evaluation of Both Ensemble and Classical Machine Learning Models

Abstract: The majority of bank customers have switched to e-banking for their regular financial activities as a result of the development of technology and the rise of electronic commerce in global trade. The emergence of e-commerce has also attracted scammers looking to swindle bank customers, rendering e-commerce platforms vulnerable to a number of assaults, the

Development of a Botnet Management Model for Cyber Security Networks using Machine Learning Algorithm

Abstract: The negative effects of Botnet on the cyberspace cannot be overemphasized. A Botnet is a group of compromised computer systems that are connected to a central controller called a Botmaster. The Botmaster uses command and control (C&C) channels to manipulate Botnets. Devices which are connected to the internet are prone to getting infected by

Coverage Enhancement for Wireless Sensor Network Using Levy Flight Whale Optimization Algorithm

Abstract: WSNs is a collection of sensor nodes with the capacity of recognizing, physical changes from the environment such as pressure, wind, air pollution, temperature, humidity, forest fire detection, vibration and many others wirelessly among themselves. Coverage of a sensor node is one of the factors that affect the strength and reliability of wireless sensor

None-Distributed Mobility Assisted Sensor Deployment Algorithm in Wireless Sensor Networks

Abstract: Sensor nodes are deployed in oreder to observe the surrounding environment for some phenomena of interest in wireless sensor networks. The problem with observing such environments is covering entire area which reflects how well a region is monitored. The random distribution of sensor nodes caused by none-uniform deployment leads to coverage holes in the

A Secure Multifactor Authentication System using Keystroke with Password

Abstract: Multifactor authentication (MFA) uses two or more forms of authentication to permit computer users to access an application using the electronic authentication method after successfully providing two or more factors. Since hackers may quickly guess usernam es and passwords using tools, the traditional log in techniques (username and password) are not totally secure against

EXPLORING THE WEARABLE AND MOBILE SENSORS FOR SUSTAINABLE AND EFFICIENT HEALTH MONITORING SYSTEMS IN POST COVID-19

ABSTRACT: Wearable and mobile sensors are embedded in smartphones, smartwatches, and other wearable devices to capture human physiological signals to monitor daily activities and health indicators. Some of these sensors include an accelerometer, temperature, electrocardiogram, pulse-oximeter, gyroscopes pedometer, etc. The outlined sensors and many others embedded in wearable and mobile phones have been used for