Emmanuel C. Ogu

Emmanuel C. Ogu
Babcock University · Department of Computer Science

PhD

About

35
Publications
255,022
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
94
Citations
Citations since 2016
18 Research Items
88 Citations
201620172018201920202021202205101520
201620172018201920202021202205101520
201620172018201920202021202205101520
201620172018201920202021202205101520
Introduction
Computer Science┃Cybersecurity┃ Technology Governance┃Digital Development...
Additional affiliations
January 2018 - present
Babcock University
Position
  • Lecturer
Description
  • A Lecturer in Computer Science...
September 2014 - December 2017
Babcock University
Position
  • Lecturer
Description
  • An Assistant Lecturer of Computer Science...
September 2014 - present
Babcock University
Position
  • Researcher
Description
  • Engage in quality high-impact researches in the specialisations of Cybersecurity, Network Security, Systems Security, Enterprise Security, Cyber Laws, and Business Information Technologies, within the Computer Science discipline...
Education
September 2014 - June 2018
Babcock University
Field of study
  • Computer Science (Cyber and Network Security)
January 2013 - June 2014
Babcock University
Field of study
  • Computer Science (Networking and Telecommunications)
August 2007 - June 2011
Babcock University
Field of study
  • Computer Science (Technology)

Publications

Publications (35)
Article
Full-text available
An Expert System is an intelligent computer program that employs knowledge and inference procedures to solve problems that are considered difficult enough to require significant human expertise for their solutions [12]. Since the implementation of the first expert systems (the DENDRAL, MYCIN, Dipmeter Advisor, XCON,to mention but a few.) in the ear...
Article
Full-text available
Following the dawn of the Information Age, Computers and the Technologies that power them have been proven a double-edged sword with the potential for both good and evil – depending on how much the user(s) can harness them in either direction. On one end of the stick, we seem doused by the development of sophisticated devices and gadgets to assuage...
Article
Full-text available
The Internet is growing to become a necessary and indispensable tool for the common man. Security has remained a hindrance to reaping the full, immense benefits of the Internet. Cybercrimes have been on the rise, and are becoming even easier to perpetrate even for the unskilled and naïve users. Denial of Service (DoS) is becoming one of the most co...
Article
Full-text available
Advancements in globalization and certain requirements of 21 st century industrial processes have necessitated the creation of certain temperature-critical locations – where it is important that environmental temperatures within the confines of such locations be kept within a certain range or never beyond certain critical limits. Such environments...
Article
Full-text available
Cloud computing, and the technology of virtualization which drives its foundations, lead the pack of Information Technology (IT) solutions for business that have emerged and kept transforming businesses in recent years. While in acknowledgement of the fact that numerous researches have emerged in recent times on the concepts of virtualization and c...
Article
Full-text available
Thousands of new threats and threat categories continue to emerge every second in cyberspace, even as known threats keep adapting robustly to existing solutions. This has challenged modern approaches and solutions to threat detection and potentially rendered some of these obsolete even before they are able to find applicability. Much contemporary c...
Article
The EdTech debate continues to gather attention among academia, digital rights and privacy advocates, and the general public. While much ink is spilled by EdTech critics, with best interest for students facing a datafied and platformised education at heart, youth’s voice is rarely present. Much is written about what EdTech means for education proce...
Preprint
Botnets have been around for about three decades, and their sophistication and capabilities have evolved rapidly over the period. Originally simple codes that were used for the administration of IRC channels, botnets today pose very formidable threats to systems and network infrastructure. They have become one of the more-preferred options in the t...
Article
Full-text available
Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift. As research efforts continue to seek a deeper and robust understanding of the nature of the threat for more effective solutio...
Conference Paper
Full-text available
Technology-enhanced Learning Environments (TeLEs) and the adoption of various information technology-aided media towards effective and efficient education have grown popularity over the current decade. The benefits that information technology (IT) capabilities have brought into the traditional learning processes propelled this growing popularity of...
Chapter
Full-text available
The Global Sustainable Development Framework (SDF) published by the United Nations in December 2012 advanced in January 2016 into what has now become known as the UN Sustainable Development Agenda 2030 defining 17 universal goals and 169 targets for the pursuit and attainment of Global Sustainable Development. However, the global sustainability jou...
Preprint
Full-text available
The perpetration of various malicious activities and crimes within cyberspace by persons, corporate entities, as well as state and non-state actors in recent years, has resulted in increased interest in the areas of cybersecurity research and legislation. Many have persistently called for the establishment and global adoption of a unified trans-jur...
Conference Paper
Full-text available
Information and Communication Technology (ICT) and Social Networking Websites have become forces to reckon with in the task of information dissemination in the 21 st Century. Having a divine mandate to evangelize the world as pre-pointer to the second advent of Jesus Christ, these two forces have become tools of invaluable worth for the Christian w...
Article
Full-text available
Hackers have devised a recent technique of infiltrating critical infrastructure with wanton applications that gulp at the limited resources possessed by these infrastructure for meeting critical needs and deadlines. Also a reality is the fact that hackers could breach already existing and trusted applications or software on these critical infrastru...
Article
Full-text available
Denial of Service and Distributed Denial of Service Attacks have significantly shackled the development of computer networks and the internet, and masked their innumerable benefits behind many hours of service unavailability. These attacks are fostered, especially in their distributed variant, by networks of compromised machines (known as botnets,...
Article
Bots are fast becoming the infamous insurgents lurking around network infrastructures and the internet, with arguably at least one of such compromised machines sitting in homes and offices around the world. These malicious network tenants have shown similar resilience to such real-life terrorist networks as ISIS, Al-Qaeda, Boko Haram, and other arm...
Article
Full-text available
Globalization arguably has a link with terrorism, but the extent to which these two are linked has been a subject of continued research and debate across time and space. The subject of terrorism has been top in the agenda of the United Nations and other regional and even national governments, including Nigeria, since the end of the Cold War, and pa...
Article
Full-text available
Virtualization, the technology that allows multiple guests (clients) to reside on a single host (provider) machine and share the resources of the host machine, is rapidly gaining prominence in the corporate business world of the 21 st century. Virtualization is a powerful technology for increasing the efficiency of computing services. However, besi...
Article
Full-text available
The challenge of denial of service (DoS) attacks and its distributed (DDoS) variants have immensely clogged the pathway of growth and development of the Internet and its reliant technologies, as well as computing infrastructure in general. This type of attacks have gradually carved a niche for itself as one of the most obnoxious forms of attacks to...
Article
Full-text available
Cloud computing, the technology that makes it possible for computing resources to be provisioned to clients / subscribers over long distances, as well as its component technology – virtualization, which makes it possible for multiple guest systems to co-reside on a single host machine and share the computing resources of the host, have both become...
Article
Full-text available
It is common knowledge that the use of appropriate Information and Communication Technologies (ICTs) has come to revolutionize the 21 st century business environment, hence becoming a most pertinent metric of global best practice assessment in recent times. This paper traces the origins of ICTs in business practices along a developmental timeline t...
Article
Full-text available
One of the emerging trends that have gained increasing prominence and is fast becoming a household name in the global IT industry is the concept of cognizant computing. Research has repeatedly suggested that this technology may hold the key to satisfying nearly all the computing needs of humanity even down to the preferences of the unique individua...
Conference Paper
Full-text available
Virtualization, the technology that allows multiple guests (clients) to reside on a single host (provider) machine and share the resources of the host machine, is rapidly gaining prominence in the corporate business world of the 21st century. Virtualization is a powerful technology for increasing the efficiency of computing services. However, besid...
Thesis
The security of most modern network infrastructures and the internet, as well as the services and applications that rely on these, has faced continuous sabotage in terms of security in recent times. This has led to scepticisms and reservations on the part of businesses and administrators across various sectors in adopting and subscribing to network...
Article
Full-text available
Our generation has seen Computers in various types and sizes. Ranging from the Super Computers that are used to store, manage and decode satellite transmission data, to the Mainframes and Towers that form the backbone of large Corporate online and offline organizations, and then the Mini-Towers that provide server-end services to smaller organizati...

Questions

Questions (4)
Question
Is /Are there any technical difference / differences between a framework, a model and an architecture in research processes, particularly at the doctoral (PhD) level...?
Question
Hello,
I am currently on a research to develop a Counter-Insurgent Cyber Architecture, and I am having difficulty locating research works on cybersecurity countermeasures, especially as it relates to measures and solutions to mitigate cyber-insurgency, as well as terrorism in Cyberspace or in the Real World. This is needed to help me build my body of literature for the research. Though I am aware that the area is relatively new; but then, could anyone kindly assist with relevant sources in this research area...?
I would appreciate all the help I can get.
You may just simply post here reference information of such research sources, so I could try and locate them, or attach them here if they are open access articles already in your electronic library. This would be greatly appreciated. Thanks in anticipation...
Question
Do you think it would be possible to develop a formal model for the detection, identification and classification of Botnets...? If yes, what are some of the essentials that must be covered in such a model...? And if no, why do you think it would be impossible...?
Thanks for your responses...
Question
Botnets are fast becoming the next generation of Cyber-Terrorism...
Just pondering. What are some of the similarities and differences exhibited between these two types of networks?
I plan on publishing a review article on this discussion in a couple weeks time. So I'm looking for just 2 (two) collaborators / co-authors with research interest in this or related area to work with me on this research. Kindly indicate your interest here and we can begin work soonest.
Contributions and Answers to the question are however open for everyone. They would all go a long way in adding value to the research...
Thanks!

Network

Cited By

Projects

Projects (2)
Project
To build epistemology as relates to the most essential constituents in Cybersecurity Research... Creating an guide for the beginning Cybersecurity / Information Security Researcher...
Project
To develop a Model for Botnet Countermeasures that is based on lessons learnt from the Global fight against Terrorism, and the methods that have yielded remarkable progress...