Publication
Publisher:
IAENG
Publication Type:
Conference
Publication Title:
On Forensics Investigation Models
Publication Authors:
Eso Dieko, Alese Boniface K., Thompson Aderonke F. And Iyare Otasowie
Year Published:
2014
Abstract:
In any court case, the technical expert’s evidence isopen to legal challenge and such challenges, irrespective of theoutcome, might delay the process of litigation. Hence, it ispertinent that the investigator and expert pre-empt any delayby making the report as comprehensive and complete aspossible. The investigator can thus follow a digital forensicprocess model to aid the digital investigation. The challengetherefore in digital forensics is to find and discover forensicallyinteresting, suspicious or useful patterns within often verylarge data sets. Consequently, this paper presents a dynamic,adaptive clustering model to arrange unstructured documentsinto content-based homogeneous groups. The documentclustering framework, based on kernel k-means which relies onRadial Basis Function (RBF) has demonstrated can profitablysupport intelligence and security activities in identifying,tracking, extracting, classifying and discovering patterns, sothat the outcomes can generate alert notifications accordingly.Also, the method can generate consistent structures forinformation access and retrieval.
Publisher:
Proceedings Of The World Congress On Engineering And Computer Science
Publication Type:
Conferenceproceeding
Publication Title:
A Bayesian Network Model For Risk Management In Cyber Situation
Publication Authors:
Bode Moyinoluwa A., Alese Boniface K., Thompson Aderonke F. And Iyare Otasowie
Year Published:
2014
Abstract:
The transformation in e-commerce with the
advent of other internet based activities has increased the
impact of Cyber-attacks on organizations and nations at large.
However, tracking these attacks and determining risks posed
ensure the overall security in cyber situation and invariably
enhances communication and economic growth. Consequently,
this paper presents a robust predictive model based on Bayes
Theorem, capable of distinguishing between bad connections
called threats or attacks, and good which is known as normal
connections. The model analyses the state of network traffic
and determine its risk using the KDD Cup 1999 dataset. In
conclusion, comparison of the Bayes model with Association
Rule Mining model shows efficient performance, and an
improved performance with a Genetic Algorithm technique
Publisher:
Proceedings Of The World Congress On Engineering
Publication Type:
Conferenceproceeding
Publication Title:
Analysing Issues Of Cyber Threats In Nigeria
Publication Authors:
Boniface K. Alese, Aderonke F. Thompson, Korede V. Owa, Otasowie Iyare., Olufemi T. Adebayo
Year Published:
2014
Abstract:
This paper examines the pattern of cyber threats
and information security in line with the Nigerian approach to
meeting these challenges in the 21st century. Investigation was
carried out on the level of awareness and compliance with the
existing cyber security policies among the cyberspace users.
The level of enforcement of these policies or measures by
cybercafé administrators and government security agencies is
also considered. The research employed primarily qualitative
methods in the design and analysis. A questionnaire was
designed and used in the study. Data obtained from the survey
through the questionnaires administered were subjected to
analysis using the Statistical Package for Social Sciences
(SPSS). The results of the analysis suggest the major group of
the populace that are mostly active in committing cybercrime
Publisher:
Anale. Seria Informatica
Publication Type:
Conferenceproceeding
Publication Title:
A NEURO--FUZZY SYSTEM FOR DECEPTION DETECTION DURING INTERROGATION IN LAW ENFORCEMENT AGENCY
Publication Authors:
Otasowiie Iyare,, Boniiface Kayode Allese,, Ollumiide Adewalle,, Samuell Fallaki
Year Published:
2013
Abstract:
The development of soft-computing
approaches in law enforcement agencies has a wide
range of application to intelligence analysis in the face of
interrogation and evidence gathering during
investigation. The capability of these tools to alleviate
attempted deception by an informant or suspect is
affected by many issues including the type of critical
method, the type of hybridization used, and the ability to
address issues of source reliability and information
credibility. This work at the end will presents a hybrid
model using neuro-fuzzy system to aid in the detection of deception during interrogation
Publisher:
Nil
Publication Type:
Disertations
Publication Title:
Design Of A Secure Information Sharing System For E-Policing (A Case Study Of Ondo State Police Command)
Publication Authors:
Iyare O
Year Published:
2010
Abstract:
Publisher:
Nil
Publication Type:
Disertations
Publication Title:
Computerised Payroll Application (A Case Study Of Ebonyi State University Teaching Hospital)B.Sc Dissertation, Ebonyi State University, Abakaliki, Ebonyi State.
Publication Authors:
Iyare O
Year Published:
2005
Abstract: