Publication

Publisher:
 IAENG
Publication Type:
 Conference
Publication Title:
 On Forensics Investigation Models
Publication Authors:
 Eso Dieko, Alese Boniface K., Thompson Aderonke F. And Iyare Otasowie
Year Published:
 2014
Abstract:
In any court case, the technical expert’s evidence isopen to legal challenge and such challenges, irrespective of theoutcome, might delay the process of litigation. Hence, it ispertinent that the investigator and expert pre-empt any delayby making the report as comprehensive and complete aspossible. The investigator can thus follow a digital forensicprocess model to aid the digital investigation. The challengetherefore in digital forensics is to find and discover forensicallyinteresting, suspicious or useful patterns within often verylarge data sets. Consequently, this paper presents a dynamic,adaptive clustering model to arrange unstructured documentsinto content-based homogeneous groups. The documentclustering framework, based on kernel k-means which relies onRadial Basis Function (RBF) has demonstrated can profitablysupport intelligence and security activities in identifying,tracking, extracting, classifying and discovering patterns, sothat the outcomes can generate alert notifications accordingly.Also, the method can generate consistent structures forinformation access and retrieval. 
Publisher:
 Proceedings Of The World Congress On Engineering And Computer Science
Publication Type:
 Conferenceproceeding
Publication Title:
 A Bayesian Network Model For Risk Management In Cyber Situation
Publication Authors:
 Bode Moyinoluwa A., Alese Boniface K., Thompson Aderonke F. And Iyare Otasowie
Year Published:
 2014
Abstract:
The transformation in e-commerce with the advent of other internet based activities has increased the impact of Cyber-attacks on organizations and nations at large. However, tracking these attacks and determining risks posed ensure the overall security in cyber situation and invariably enhances communication and economic growth. Consequently, this paper presents a robust predictive model based on Bayes Theorem, capable of distinguishing between bad connections called threats or attacks, and good which is known as normal connections. The model analyses the state of network traffic and determine its risk using the KDD Cup 1999 dataset. In conclusion, comparison of the Bayes model with Association Rule Mining model shows efficient performance, and an improved performance with a Genetic Algorithm technique 
Publisher:
 Proceedings Of The World Congress On Engineering
Publication Type:
 Conferenceproceeding
Publication Title:
 Analysing Issues Of Cyber Threats In Nigeria
Publication Authors:
 Boniface K. Alese, Aderonke F. Thompson, Korede V. Owa, Otasowie Iyare., Olufemi T. Adebayo
Year Published:
 2014
Abstract:
This paper examines the pattern of cyber threats and information security in line with the Nigerian approach to meeting these challenges in the 21st century. Investigation was carried out on the level of awareness and compliance with the existing cyber security policies among the cyberspace users. The level of enforcement of these policies or measures by cybercafé administrators and government security agencies is also considered. The research employed primarily qualitative methods in the design and analysis. A questionnaire was designed and used in the study. Data obtained from the survey through the questionnaires administered were subjected to analysis using the Statistical Package for Social Sciences (SPSS). The results of the analysis suggest the major group of the populace that are mostly active in committing cybercrime 
Publisher:
 Anale. Seria Informatica
Publication Type:
 Conferenceproceeding
Publication Title:
 A NEURO--FUZZY SYSTEM FOR DECEPTION DETECTION DURING INTERROGATION IN LAW ENFORCEMENT AGENCY
Publication Authors:
 Otasowiie Iyare,, Boniiface Kayode Allese,, Ollumiide Adewalle,, Samuell Fallaki
Year Published:
 2013
Abstract:
The development of soft-computing approaches in law enforcement agencies has a wide range of application to intelligence analysis in the face of interrogation and evidence gathering during investigation. The capability of these tools to alleviate attempted deception by an informant or suspect is affected by many issues including the type of critical method, the type of hybridization used, and the ability to address issues of source reliability and information credibility. This work at the end will presents a hybrid model using neuro-fuzzy system to aid in the detection of deception during interrogation 
Publisher:
 Nil
Publication Type:
 Disertations
Publication Title:
 Design Of A Secure Information Sharing System For E-Policing (A Case Study Of Ondo State Police Command)
Publication Authors:
 Iyare O
Year Published:
 2010
Abstract:

Nil

 
Publisher:
 Nil
Publication Type:
 Disertations
Publication Title:
 Computerised Payroll Application (A Case Study Of Ebonyi State University Teaching Hospital)B.Sc Dissertation, Ebonyi State University, Abakaliki, Ebonyi State.
Publication Authors:
 Iyare O
Year Published:
 2005
Abstract:

Nil