Logo
  • Home
  • About NCS
  • Publications
    • Journal of Computer Science and Its Applications
    • Journal of Information Security, Privacy and Digital Forensics
    • Conference Proceedings
    • Technical Reports
    • Downloads
  • Journal Subscription
  • Home
  • About NCS
  • Publications
    • Journal of Computer Science and Its Applications
    • Journal of Information Security, Privacy and Digital Forensics
    • Conference Proceedings
    • Technical Reports
    • Downloads
  • Journal Subscription
Logo
  • Home
  • About NCS
  • Publications
    • Journal of Computer Science and Its Applications
    • Journal of Information Security, Privacy and Digital Forensics
    • Conference Proceedings
    • Technical Reports
    • Downloads
  • Journal Subscription

JOURNAL OF INFORMATION SECURITY, PRIVACY AND DIGITAL FORENSIC: VOLUME 8, NO.2, DECEMBER 2024

Home / JOURNAL OF INFORMATION SECURITY, PRIVACY AND DIGITAL FORENSIC: VOLUME 8, NO.2, DECEMBER 2024

JOURNAL OF INFORMATION SECURITY, PRIVACY AND DIGITAL FORENSIC: VOLUME 8, NO.2, DECEMBER 2024

Jan 22, 2025Nigeria Computer SocietyJISPDF
ARTICLES AND AUTHORS
  • Detecting Fraudulent Financial Transactions using Deep Learning and Transaction Log Analysis

    A. N. Babatunde, T. A. Abdulrahman, S. A. Ajagbe, K. Oladipo, R. A. Ajiboye and I. I. Akuji

  • A Hybrid Deep Learning and Symbolic AI for Anomaly Detection in Heterogeneous High-Performance Computing Systems

    O. B. Okunoye and S. O. Oyebola

  • BUAS: A Blockchain-Enabled Trust-Aware Security Architecture for Scalable and Resilient UAV Networks

    C. N Mabude, E. Nebe, J. B. Odili and S. O. Hassan

  • Secured Mobile Ad-Hoc Network (MANET) Using Lightweight Encryption Scheme

    S. O. Akinboro, R. Isimeto, F. A. Oladeji, D. O. Tunwashe and D. D. Owadokun

  • Information Communication and Network Security System Modelling using Geometry Based Block Code in Information Theory (GBCIT) Technique

    S. O. Oladejo, A. D. Adeniyi and A. O. Adesola

  • Enhancing social protection through blockchain-based identity verification and data communication: A systematic review

    M. K. Orfega, F. B. Osang and U. G. Inyang

Previous Post
Next Post

SHARE

Search Articles

Icon
SAFETYNET: A COLLABORATIVE AND PRIVACY-PRESERVING MOBILE SAFETY APPLICATION SYSTEM
425.37 KB 1 file(s)
Icon
ADVANCING HEALTHCARE THROUGH EMERGING TECHNOLOGIES: A SYSTEMATIC REVIEW OF BENEFITS, CHALLENGES, METHODOLOGIES, AND RESEARCH DIRECTIONS
382.96 KB 1 file(s)
Icon
EXPLORING CO-DESIGN CHALLENGES AND INSIGHTS FOR CO-DESIGNING AN MHEALTH INTERVENTION FOR MALARIA PREVENTION AND CONTROL IN MARGINALIZED COMMUNITIES IN NIGERIA
359.15 KB 1 file(s)
Icon
SOFTWARE ENGINEERING FOR THE INDEPENDENT NATIONAL ELECTORAL COMMISSION’S (INEC) ELECTION VIEWING PORTAL (IREV)
526.80 KB 1 file(s)
Icon
A SURVEY ON TRADITIONAL AND DEEP LEARNING TECHNIQUES FOR CYBER ATTACK DETECTION IN INTERNET OF MEDICAL THINGS
518.17 KB 1 file(s)
Icon
DISTRIBUTED LEDGER TECHNOLOGIES (DLTS): RECONCILING THE TRADE-OFF BETWEEN TRANSACTION EFFICIENCY AND FINANCIAL REGULATIONS
330.59 KB 1 file(s)
Icon
DETECTING EXTREMISM IN TWEETS USING LEXICON-BASED TECHNIQUE
621.60 KB 1 file(s)
Icon
CROSS-PARTITION ATTENTION (CPA): A PROPOSED SCALABLE TRANSFORMER FRAMEWORK FOR SMART CONTRACT VULNERABILITY DETECTION
679.31 KB 1 file(s)
Icon
ENSEMBLE TECHNIQUES FOR DEEPFAKE DETECTION: COMPARING STACKING, WEIGHTED VOTING AND AVERAGING APPROACHES
801.86 KB 1 file(s)
Icon
CLASSIFICATION OF SICKLE CELL ANAEMIA SEVERITY USING HAEMATOLOGICAL PARAMETERS: A MACHINE LEARNING APPROACH
828.33 KB 1 file(s)
Copyright © 2020 Nigeria Computer Society. All Rights Reserved
  • Follow us