DETECTION OF PHISHING UNIFORM RESOURCE LOCATOR (URL) USING SUPERVISED MACHINE LEARNING ALGORITHM

ABSTRACT: The growth of the Internet and computer network security have aroused users’ responsiveness to the secured network environment as this created a basis for the rapid and comprehensive progress observed in Internet patronage. Part of the challenges in the rapid internet growth is the internet security. Using phishing as an example in today’s world

COUNTERING CYBER THREATS IN OFFSHORE OPERATIONS OF SMART FIELDS

ABSTRACT: The significance of offshore petroleum in providing the world’s energy demands cannot be over overstated. The growing global energy resources demand, along with considerable technological developments, has resulted in a dramatic transfer of petroleum operations from onshore to offshore locations. States and oil companies are looking to the sea for offshore petroleum resources more

ADOPTION OF BLOCKCHAIN TECHNOLOGY FRAMEWORK FOR ADDRESSING COUNTERFEIT DRUGS CIRCULATION IN NIGERIA

ABSTRACT: In this study, a blockchain technology framework that can handle the drug distribution chain was discussed. Since blockchain technology offers immutability, transparency and tamper-proof, its functionalities are what intrigued the study as it can monitor the movement of drugs in the distribution chain. Counterfeit drugs are a problem in both developed and developing countries.

AN ENHANCED CLOUD-BASED RANDOMISED CRYPTOGRAPHIC ALGORITHM FOR A PSEUDO-DNA ONE-TIME PAD (OTP) CIPHER

Abstract A profound consequence of the benefits of the web as a communication platform, and the cloud as a storage medium, is ensuring the security of information in transit and in storage due to its nebulousness. The computational overhead and known attacks associated with the traditional cryptographic methods necessitate a shift in paradigm in order

Performance Analysis of Selected Machine Learning Algorithms for the Detection of Cervical Cancer Based on Behavioral Risk Dataset

ABSTRACT: Past studies have reported that cervical cancer is the second most common cancer among women in the world. Aside medical diagnosis and treatment, machine learning algorithms have been used widely for the classification of cervical cancer. These machine learning techniques have been found promising for cervical cancer identification by making use of relevant cervical

Netiquette of Cyberbullying and Privacy Issues

ABSTRACT: Modern communication platforms such as Social networking (Facebook, LinkedIn, Google Plus); Microblogging (Twitter, Tumblr); Photo sharing (Instagram, Snapchat, Pinterest) and Video sharing (YouTube, Facebook Live, Periscope, Vimeo) have become tools of communication in all business environments. Thus, their usage have brought about loss of values and disrespect for human dignity on Netiquette (concerning behaviour

Evaluating the Effectiveness of Digital Forensics in Crime Investigation in Nigeria-An experimental Design Approach

ABSTRACT: Digital forensic (DF) has the potential to reduce the crime rate but this benefit may not be realized in Nigeria where the adoption of digital forensics in crime investigation is low and it is based on an organization’s standard operating procedure (SOP). The study aimed at evaluating the effect of SOP used by different