About
5
Publications
1,769
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4
Citations
Introduction
Lecturer at the Software Engineering Dept. in School of Computing, Federal University of Technology, Akure, Nigeria. Research interest include: Software Engineering, Information Security, and Deep Learning. Game theory and Strategic Thinking, inclusive.
Skills and Expertise
Current institution
Publications
Publications (5)
Insider threat refers to those threats which are malicious and perpetrated from within by people and employees of an organization who have direct and legitimate access to its network and computing systems, and are knowledgeable about its security architecture and mode of operation. However, every successful malfeasance or benign behavior and incide...
Malicious insiders pose serious threat to organizations, institutions, and governments' critical infrastructure because of their access to confidential data, systems, and resources. This threat, often referred to as the insider threat, is most of the time regarded as a human factor problem-often driven by motivation, opportunity, and capability. As...
Insider threats pose serious danger to cybersecurity. Insiders possess greater privileges and authorized access to information and resources compared to external attackers, which can result in significant harm to a business if compromised. However, for every malfeasance or benign behavior on a network, digital footprints are often left behind in th...
Cyber security is a field designed to protect computers connected to the internet from attacks, and hence prevent unauthorized users from accessing the sensitive data present in it. Lately, it has witnessed intensified research from both academia and the industry. However, traditional cyber security technologies still face inadequacies in tackling...
Questions
Question (1)
The 'game-theoretic modeling and analysis of insider threats' by Liu et al, 2008) is a stochastic game model; just wondering if an interpretation of it is deterministic mode to express out the conditions for Nash Equilibrium.
Network
Cited