Publication

Publisher:
 Proceedings Of Informing Science & IT Education Conference (InSITE)
Publication Type:
 Journal
Publication Title:
 Contributory Indices To Cybercrime Activities In Nigeria.
Publication Authors:
 192. Akinyokun, O. K., Alese, B. K., Oluwadare, S. A., Iyare, O., & Iwasokun, G. B.
Year Published:
 2015
Abstract:
The arrival of Internet has turned the world into a global village where geographical location or distance has to some extent ceased to be a major obstacle to communication and movement of goods and services. This development has also brought with it cybercrime and its level of sophistication. A lot of measures and institutions are being put in place to minimize the incidence of cybercrime in different countries; also, efforts are being made to identify the contributing factors to cybercrime. This research however, adopts a factor analytic approach to formulate the indices that may contribute to the perpetration of cybercrime. A total of seventy three (73) indices were formulated and used to design a structured questionnaire which was administered on five classes of respondents, using purposive and simple random sampling techniques. The data obtained were analyzed by means of factor analysis by principal component using Statistical Package for Social Sciences (SPSS). Ten factors were extracted and subjected to orthogonal rotation using promax. The contributing factors identified in this study could assist stakeholders to combat the menace of cybercrime. 
Publisher:
 Proceedings Of Informing Science & IT Education Conference (InSITE)
Publication Type:
 Journal
Publication Title:
 An Enhanced Graphical Password Technique Using Fake Pointers
Publication Authors:
 191. Alese, B. K., Omojowo, A. A., Adesuyi, A. T., Thompson, A. F., Adewale O. S., & Osuolale F. O.
Year Published:
 2015
Abstract:
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the determination of a user being allowed access to a resource(s) is done cautiously. Alphanumeric password has been used for authentication, however, it is inherently limited. Graphical password is a possible alternative. Consequently, this paper designs a new graphical password technique based on images, rather than alphanumeric strings. Although, graphical password technique is more secure than textual password. It is also vulnerable to attacks. The most common problem therefore with Graphical Password is the Shoulder Surfing problem, also called “PEEPING ATTACK”. In this paper, we proposed a user authentication technique called “FAKEPOINTER”- a user authentication technique that conceals users’ authentication secret regardless of a shoulder surfer success by video camera(s). In the software designed, a graphical password fake indicator (pointer) is incorporated to enhance users’ login (password) against attack. The system is designed to run on windows platform with .Net support with Microsoft Structured Query Language Server as the back end, C# as front end. The system performs better when compared to existing system 
Publisher:
 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA 2015), London United Kingdom
Publication Type:
 Journal
Publication Title:
 Risk Analysis In Cyber Situation Awareness Using Bayesian Approach
Publication Authors:
 190. Moyinoluwa Abidemi Bode, Boniface Kayode Alese, Samuel Adebayo Oluwadare, Aderonke Favour-Bethy Thompson
Year Published:
 2015
Abstract:

Nil

 
Publisher:
 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA 2015), London United Kingdom
Publication Type:
 Journal
Publication Title:
 Development Of Cyber Situation Awareness Model.
Publication Authors:
 189. Dauda Adenusi, Boniface Kayode Alese, Bamidele Moses Kuboye And Aderonke Favour-Bethy Thompson
Year Published:
 2015
Abstract:
his study designed and simulated cyber situation awareness model for gaining experience of cyberspace condition. This was with a view to timely detecting anomalous activities and taking proactive decision safeguard the cyberspace. The situation awareness model was modelled using Artificial Intelligence (AI) technique. The cyber situation perception sub-model of the situation awareness model was modelled using Artificial Neural Networks (ANN). The comprehension and projection submodels of the situation awareness model were modelled using Rule-Based Reasoning (RBR) techniques. The cyber situation perception sub-model was simulated in MATLAB 7.0 using standard intrusion dataset of KDD'99. The cyber situation perception sub-model was evaluated for threats detection accuracy using precision, recall and overall accuracy metrics. The simulation result obtained for the performance metrics showed that the cyber-situation sub-model of the cybersituation model better with increase in number of training data records. The cyber situation model designed was able to meet its overall goal of assisting network administrators to gain experience of cyberspace condition. The model was capable of sensing the cyberspace condition, perform analysis based on the sensed condition and predicting the near future condition of the cyberspace. 
Publisher:
 International Journal Of Computer, Electrical, Automation, Control And Information Engineering Vol:9, No:5, 2015
Publication Type:
 Journal
Publication Title:
 Cyber Security In Nigeria: A Collaboration Between Communities And Professionals
Publication Authors:
 K. Alese Boniface, K. Adu Michael, K. Owa Victor
Year Published:
 2015
Abstract:
ecurity can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having her own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria. 
Publisher:
 Network And System Sciences
Publication Type:
 Journal
Publication Title:
 An Appraisal Of Wireless Sensor Networks: Profiles And Characters; Int. J. Communications
Publication Authors:
 Adedoyin Olayinka Ajayi, Boniface Kayode Alese, Adebayo Olusola Adetunmbi
Year Published:
 2015
Abstract:
This paper presents an in-depth evaluation of Wireless Sensor Networks. Wireless Sensor Networks have been highlighted as the major component that enables the development of modern infrastructures, such as the Smart Grid. As part of an on-going edification process on the subject matter, this paper brings to fore the many important functions and components of Wireless Sensor Networks, including application areas, functional architectures, physical topological design, communication protocols, routing schemes and Wireless Sensor Network hardware capabilities. 
Publisher:
 Foundation Of Computer Science (FCS)
Publication Type:
 Journal
Publication Title:
 CA As Context (Environment) Sensitive System.
Publication Authors:
 Olubadeji B., Adetunmbi A.O And Alese B.K
Year Published:
 2015
Abstract:

Nil

 
Publisher:
 International Journal Of Intelligent Computing Research (IJICR)
Publication Type:
 Journal
Publication Title:
 Forensic Analysis And The Inimitability Of Human Footprints
Publication Authors:
 Osisanwo, F. Y., Adetunmbi, A. O. And Alese, B. K.
Year Published:
 2015
Abstract:
Divers features of human body are being explored on daily basis for person identification based on their uniqueness to individuals. The use of fingerprint in crime investigation has come to stay, but criminals are getting smarter by protecting their fingerprints from being evidence at a crime scene. Concealing of footprint or shoe print is yet to become popular, some criminals still go bare footed to crime scene. Footprint can be secured and analysed using image processing techniques such as de-noising, image partitioning, pattern matching This research looks at the inimitability of person footprints, should in any circumstance foot prints are found at a scene and are required to suggest a suspect or criminal. Image processing algorithms are employed to analyse barefoot prints in other to establish the uniqueness of the footprints. 
Publisher:
 IJISET - International Journal Of Innovative Science, Engineering & Technology
Publication Type:
 Journal
Publication Title:
 Digital Yoruba Corpus
Publication Authors:
 Fagbolu, O., Ojoawo A., Ajibake K, And Alese, B. K.
Year Published:
 2015
Abstract:

Nil

 
Publisher:
 Acta Informatica Pragensia
Publication Type:
 Journal
Publication Title:
 Fine-Grained Data Access Control In Wireless Sensor Network
Publication Authors:
 Alese, B. K. Olatunji, S. O., Agbonifo, C. O And Thompson, A.F
Year Published:
 2015
Abstract:
The evolving realities of Wireless Sensor Network (WSN) deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE) to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.