Phishing Detection: Performance Evaluation of Both Ensemble and Classical Machine Learning Models

Abstract: The majority of bank customers have switched to e-banking for their regular financial activities as a result of the development of technology and the rise of electronic commerce in global trade. The emergence of e-commerce has also attracted scammers looking to swindle bank customers, rendering e-commerce platforms vulnerable to a number of assaults, the

Development of a Botnet Management Model for Cyber Security Networks using Machine Learning Algorithm

Abstract: The negative effects of Botnet on the cyberspace cannot be overemphasized. A Botnet is a group of compromised computer systems that are connected to a central controller called a Botmaster. The Botmaster uses command and control (C&C) channels to manipulate Botnets. Devices which are connected to the internet are prone to getting infected by

Coverage Enhancement for Wireless Sensor Network Using Levy Flight Whale Optimization Algorithm

Abstract: WSNs is a collection of sensor nodes with the capacity of recognizing, physical changes from the environment such as pressure, wind, air pollution, temperature, humidity, forest fire detection, vibration and many others wirelessly among themselves. Coverage of a sensor node is one of the factors that affect the strength and reliability of wireless sensor

None-Distributed Mobility Assisted Sensor Deployment Algorithm in Wireless Sensor Networks

Abstract: Sensor nodes are deployed in oreder to observe the surrounding environment for some phenomena of interest in wireless sensor networks. The problem with observing such environments is covering entire area which reflects how well a region is monitored. The random distribution of sensor nodes caused by none-uniform deployment leads to coverage holes in the

A Secure Multifactor Authentication System using Keystroke with Password

Abstract: Multifactor authentication (MFA) uses two or more forms of authentication to permit computer users to access an application using the electronic authentication method after successfully providing two or more factors. Since hackers may quickly guess usernam es and passwords using tools, the traditional log in techniques (username and password) are not totally secure against

EXPLORING THE WEARABLE AND MOBILE SENSORS FOR SUSTAINABLE AND EFFICIENT HEALTH MONITORING SYSTEMS IN POST COVID-19

ABSTRACT: Wearable and mobile sensors are embedded in smartphones, smartwatches, and other wearable devices to capture human physiological signals to monitor daily activities and health indicators. Some of these sensors include an accelerometer, temperature, electrocardiogram, pulse-oximeter, gyroscopes pedometer, etc. The outlined sensors and many others embedded in wearable and mobile phones have been used for

DETECTION OF PHISHING UNIFORM RESOURCE LOCATOR (URL) USING SUPERVISED MACHINE LEARNING ALGORITHM

ABSTRACT: The growth of the Internet and computer network security have aroused users’ responsiveness to the secured network environment as this created a basis for the rapid and comprehensive progress observed in Internet patronage. Part of the challenges in the rapid internet growth is the internet security. Using phishing as an example in today’s world

COUNTERING CYBER THREATS IN OFFSHORE OPERATIONS OF SMART FIELDS

ABSTRACT: The significance of offshore petroleum in providing the world’s energy demands cannot be over overstated. The growing global energy resources demand, along with considerable technological developments, has resulted in a dramatic transfer of petroleum operations from onshore to offshore locations. States and oil companies are looking to the sea for offshore petroleum resources more

ADOPTION OF BLOCKCHAIN TECHNOLOGY FRAMEWORK FOR ADDRESSING COUNTERFEIT DRUGS CIRCULATION IN NIGERIA

ABSTRACT: In this study, a blockchain technology framework that can handle the drug distribution chain was discussed. Since blockchain technology offers immutability, transparency and tamper-proof, its functionalities are what intrigued the study as it can monitor the movement of drugs in the distribution chain. Counterfeit drugs are a problem in both developed and developing countries.