Joseph Adebayo OjeniyiFederal University of Technology Minna · Department of Cyber Security Science
Joseph Adebayo Ojeniyi
B.Tech., M.Sc., PhD
About
41
Publications
55,140
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
143
Citations
Publications
Publications (41)
Android malware is a trending topic in computing and cyber security science, due to over 60% of people usage of android phones. The volume and sophistication of android malware have increased due to this enormous use and creation of different applications which pose serious risks to the security of mobile devices and the services they support. Ther...
Hate speech has become a prevalent and concerning issue in this digital age as a result of the adoption of social media as a means of communication, social interaction, and driving social discussion. This trend has opened a novel front in cybercrime, cyberbullying, privacy violations, and exposure of the people component of information security to...
Enhancing network management and centralized network control is the goal of software-defined network. It separates the data plane from the control plane. Pros of SDN include its programmability, flexibility, and manageability to accommodate network users' ever-increasing demands. SDN is known to be a strong and safe defense against malicious networ...
The most widely used southbound API of the software-defined network is the Open Flow protocol. Each flow in Open Flow has a set of packet-forwarding rules, which are referred to as flow entries. The switch processes packets in the SDN operation that meet the flow entries. The Packet that doesn't match any entries is transmitted as a Packet_in messa...
The advancement in technology especially the internet has opened new frontiers to criminality and abuses of information. Social media have given racists and extremists a platform for carrying out their criminalities and attacks on legitimate users' information. Thus, there is need to give adequate attention to the communications on social media so...
Users of Android-powered smartphones and tablets have multiplied dramatically. Thanks to Android third-party apps, the essential applications, such as banking and healthcare, are accessible on Android smartphones. There are new threats to be taken into account about harmful programs when these applications are utilized and embraced more broadly. Th...
One of the most important factors that affect the yields of farm produce is the quality and usability of the soil. The analysis of the soil quality and the usability of rice, a staple crop in the world, have been of interest to many researchers. The increasing research in the field of upland rice farming is making it to gain more attention. The maj...
Over the years, digital signature algorithms such as Rivest–Shamir–Adleman (RSA) and elliptic curve digital signature algorithm (ECDSA) are the commonly used algorithms to secure data in the public key infrastructure and other computing devices. The security notions of these algorithms relied on the difficulty of an attacker to solve the integer fa...
Fake news has been there since before the advent of the Internet. It has had an immense impact on our modern society. Detecting fake news is an important step. Although there are various ways and methods in which fake news can be detected and solved. In this research paper we discuss the various conceptual frameworks and how they affect fake news....
Small sensor nodes with the capability to sense and process data make up a wireless sensor network (WSN). This environment has limitations of low energy, low computational power and simple routing protocols; making is susceptible to attacks such as sinkhole attack. This attack happens when the enemy node in the network camouflages as a genuine node...
The adoption of mobile technologies in education are evolving like in the business and health sectors. The design of user-centric platform to enable individuals participate in the activities of learning and teaching is currently area of research. The Learning Management Systems (LMS) area assists learners and academic activities but, it continues t...
Quick Response Code technology has made so easy many human digital transactions such as payment, authentication, advertisement, web navigation and others. This technology, despite being widely accepted because of its ease of creation, deployment and usage, has been recently a tool of personal identification theft in the hands of fraudster. Research...
In this paper research was carried out in order to evaluate the security risk analysis and management in banking company through the use of a questionnaire to determine the level of risk that customer of the financial institution is likely to encounter. It was discovered that though the majority of financial institution users are familiar with the...
This study is devoted to evaluating the security risk analysis and management in Online Banking transactions using Diamond Bank PLC, Nigeria among other banks. In this paper, a research was carried out in order to evaluate the security risk analysis and management in online banking transactions through the use of the questionnaire to determine the...
Online shopping has influenced on business of shopping in Nigeria and the rest of the World. Despite the security risk, threats and vulnerabilities customers are exposed to, Nigerians has adopted the platform for convenience purposes. This study seeks to the address customers satisfaction and security analysis while shopping specifically on Konga O...
Mobile wallet is a payment platform that stores money as a value in a digital account on mobile device which can then be used for payments with or without the need for the use credit/debit cards. The cases of cyber-attacks are on the rise, posing threats to the confidentiality, integrity and availability of information systems including the mobile...
As the world has greatly experienced a serious advancement in the area of technological advancement over the years, the availability of lots of sophisticated and powerful image editing tools has been on the rise. These image editing tools have become easily available on the internet, which has made people who are a novice in the field of image edit...
Security Risk management in online shopping mall has significant influence on business performance. Regardless of the security risk, threats and vulnerabilities users are exposed to, customers and shoppers still find the e-commerce platform useful and most convenient. This study seeks to address user satisfaction in relation to security analysis an...
The Internet is a global network consisting of autonomous and interconnected computer networks. At its core are backbone protocols and infrastructures. Over the years, the Internet has become target of inappropriate behaviors by both state and non-state actors. It has been increasingly subjected to significant threats and disruption. This briefing...
Welcome to the age of Big Data, where the quantity of data in the world is soaring very high on a second to second basis and in both scope and power. Indeed, Big Data has come to stay and there is no turning back since data is key to change and it is at the center of knowledge-based economic and society. In our time, an enormous amount of data is r...
Digital Forensics is an area of Forensics Science that
uses the application of scientific method toward crime
investigation. The thwarting of forensic evidence is known as
anti-forensics, the aim of which is ambiguous in the sense that it
could be bad or good. The aim of this project is to simulate
digital crimes scenario and carry out forensic and...
Digital Forensics is an area of Forensics Science that uses the application of scientific method toward crime investigation. The thwarting of forensic evidence is known as anti-forensics, the aim of which is ambiguous in the sense that it could be bad or good. The aim of this project is to simulate digital crimes scenario and carry out forensic ant...
The security of information on the network has been a major issue due to mass distribution of information on the internet. Steganography and cryptography are two important areas of study when it comes to security of the message communicated on the internet. Steganography deals with hiding of the existence of the message while cryptography deals wit...
The internet generates very large amount of data on a daily basis. While some of the information are trivial others are sensitive. As a matter of fact, the security of some information traversing the internet is critical to the survival of the owner. In this study, we implement the RSA algorithm to produce a simple system for encryption and decrypt...
Data security involves the protection of data from unauthorized access. This protection can be achieved using different techniques like cryptography, steganography and biometric. This project work combines the features of cryptography (advanced encryption standard) and biometric (fingerprint) to provide data security. An enhanced data security fram...
This paper researches on cloud computing based-on authentication for the security verification using Elliptic Curve Digital Signature Algorithm (ECDSA). The study structure simply focuses on the communication interaction of the Cloud providing communities and a pictured Smartphone user. The Elliptic Curve Cryptosystem is envisioned as the basic fra...
Questions
Question (1)
I need the database of digital crimes committed especially for cases already established may be in a court of law.