Publication

Publisher:
 Journal Of E-Learning And Education (ELEED), Volume 9, December 12, 2012. Digital Peer Publishing, Germany.
Publication Type:
 Journal
Publication Title:
 A Simple Computer Game For Learning Mathematics
Publication Authors:
 Ade-Ibijola A. O., Adetunmbi A. O. And Alese B. K. (2013)
Year Published:
 2013
Abstract:
It is sometimes unquantifiable how hard it is for most people to deal with game addiction. Several articles have equally been published to address this subject, some suggesting the concept of Educational and serious games. Similarly, researchers have revealed that it does not come easy learning a subject like math. This is where the illusive world of computer games comes in. It is amazing how much people learn from games. In this paper, we have designed and programmed a simple PC math game that teaches rudimentary topics in mathematics 
Publisher:
 International Journal Of Computer Applications (0975 – 8887), Volue 66 – No. 23, March
Publication Type:
 Journal
Publication Title:
 Elliptic Curve Cryptography For Securing Cloud Computing Applications
Publication Authors:
 Alowolodu O. D., Alese B. K., Adetunmbi A. O., Adewale O. S. And Ogundele O. S. (2013)
Year Published:
 2013
Abstract:
Computing applications and data are growing so rapidly that increasingly larger servers and data centre are needed for fast processing within the required time. A fundamental shift in the way Information Technology (IT) and computing services are being delivered and purchased results in the development of cloud computing. The out of control cost of power in terms of electricity generation, personnel hardware and limited spaces in data centers have encouraged a significant number of enterprises to move more infrastructures into a third party provided Cloud. However, Cloud computing requires that organizations trust that a service provider’s platforms are secured and provide a sufficient level of integrity for the client’s data. Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. An important factor is the key strength, i.e. the difficulty in breaking the key and retrieving the plain text. In this paper, we proposed Elliptic Curve Cryptography scheme as a secure tool to model a Secured platform for the Cloud Application 
Publisher:
 A Game-theoretic Scenario For Modelling The Attacker-Defender Interaction. Journal Of Computer Engineering & Information Technology.
Publication Type:
 Journal
Publication Title:
 A Game-theoretic Scenario For Modelling The Attacker-Defender Interaction.
Publication Authors:
 81. Ibidunmoye E.O., Alese, B.K. And Ogundele O.S.
Year Published:
 2013
Abstract:
Existing computer security techniques lack the quantitative decision framework required to defend against highly organized attacks. Game theory provides a set of quantitative and analytical tools for describing and analyzing interactive decision situations in computer security. Recently, game-theoretic approaches such as stochastic security games have been used to study security problems as an optimization game comprising multiple players notably the attackers and the defenders (system administrators). Stochastic security games are a probabilistic approach appropriate for studying particularly complex networks where attacks often go from a state and proceeds to another according to a probability distribution. A stochastic game-model that views the interaction between malicious users and network administrators as a two-player zerosum game was developed. A binary coding scheme was employed for identifying game states and game transition diagrams were generated to describe possible movements of players. A stochastic algorithm was developed to solve the game and compute the optimal strategies for the players. A simulation of the algorithm was carried out the output analyzed to show the techniques that network administrators can employ to predict adversary’s actions, determine vulnerable network assets and suggest optimal defense strategies for the defender 
Publisher:
 A Conference Proceedings On International Conference For Internet World Congress On Internet Security Technologies Technology And Secured Transactions
Publication Type:
 Journal
Publication Title:
 A Prosodic Text-to-Speech System For Yoruba Language
Publication Authors:
 167. Akinwonmi A. E., And Alese B. K.
Year Published:
 2013
Abstract:
We reviewed prosody realization in Text-to-Speech (TTS) applications. Standard Yoruba (SY) was considered alongside. Our review showed that the language is under-researched in the area of prosody and speech synthesis generally. Some technologies that produced good prosody in certain syllable based languages were identified. These include the use of polysyllabic units, diphones and Hidden Markov's Model (HMM). We recommended a fusion of these technologies to realize the Yoruba TTS of high prosody. A mean opinion score (MOS) is also proposed to ascertain naturalness of the proposed TTS. This report presents among others, the review of prosody techniques in TTS, challenges of a Yoruba TTS and the proposed solution 
Publisher:
 A Conference Proceedings On International Conference For Internet World Congress On Internet Security Technologies Technology And Secured Transactions, ICITST.
Publication Type:
 Journal
Publication Title:
 Post-Quantum Crystography: A Combination Of Post-Quantum Cryptography And Steganography.
Publication Authors:
 166. Gabriel A. J., Alese B. K., Adetunmbi A. O., And Adewale O. S.
Year Published:
 2013
Abstract:
Crystography, which is the combination of Cryptography and Steganography could be a suitable “tool” for enhancing the security of communications and/or computations over the cloud. Most existing Crystographic systems are based on Public key Cryptographic schemes like RSA and Elliptic Curve Cryptography (ECC), whose security depends on the difficulty of solving Integer Factorisation Problem (IFP) and Discrete Logarithm problem (DLP) respectively. However, techniques for solving IFP and DLP problems, improves continually. Therefore, the existence of Quantum Computers in the range of 1000 bits would be a real world threat to systems based on those problems. This paper thus propose a new Crystographic System that combines Post Quantum Cryptography with Steganography to ensure that security of cloud communication is maintained both in Classical Computing era as well as Post-Quantum Computing era 
Publisher:
 A Conference Proceedings On International Conference For Internet World Congress
Publication Type:
 Journal
Publication Title:
 Edge Detection Methods In Palm-Print Identification.
Publication Authors:
 165. Akinsowon O. A., Alese B. K.
Year Published:
 2013
Abstract:
Biometric recognition, or simply biometrics, refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics it is possible to confirm or establish an individual's identity based on "who she is", rather than by "what she possesses" (e.g., an ID card) or "what she remembers" (e.g., a password). Today, it is becoming more and more popular to use biometrics to identify people and authenticate them for access to secure areas and systems. Biometric has been getting more and more attention after the September 9/11 episode in America. It is a unique, measurable characteristic or trait of a human being for automatically recognizing or verifying identity. This paper spotlights biometric recognition as a key form of identification, one which is increasingly used in a wide range of applications made possible by advanced pattern recognition algorithms applied through powerful lCT. 
Publisher:
 A Conference Proceedings On International Conference For Internet World Congress On Internet Security Technologies Technology And Secured Transactions, ICITST.
Publication Type:
 Journal
Publication Title:
 DGM Approach To Network Attacker And Defender Strategies. ‘Information Security
Publication Authors:
 164. Alese B. K., Iwasokun G. B. And Haruna D. I.
Year Published:
 2013
Abstract:
The computer game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions within the network. Like attack-graph-based model checking, the goal of an anticipation game is to prove that a safety property holds. However, using this kind of game is tedious and error prone on large networks because it assumes that the analyst has prior and complete knowledge of critical network services. This work presents a non-zero, Deterministic Game-Theoretic Modeling (DGM) method for analyzing the security of computer networks. The interaction between an attacker and a defender is viewed as two-player non-zero deterministic game whose model is constructed using a saddle point solution (non-linear program) to compute the value of the game. The probability of possible attack on a network given available attacker strategy or best-response strategies for the attacker and the defender was demonstrated. The simulation of the model was achieved using Java, which is a high level language with object oriented programming capabilities and features. The backend is implemented using MySQL, which is a widely used relational database management system (RDBMS). Selected results of the games played were presented with analysis showing some likely attacker activities and the counter measures from the defender. 
Publisher:
 A Conference Proceedings On E- Government And National Security.
Publication Type:
 Journal
Publication Title:
 Factors Influencing The Adoption Of E-Government Services In Nigeria.
Publication Authors:
 163. Ogunleye G. O., Adewale O. S., And Alese B. K.
Year Published:
 2013
Abstract:

Nil

 
Publisher:
 An International Multidisciplinary Conference On Research, Developments And Practices In Science, Technology, Education, Arts, Management & The Social Sciences
Publication Type:
 Journal
Publication Title:
 Web Enabled Campus Emergency Communication System.
Publication Authors:
 Alese B. K., Thompson F. B., Iwasokun G. B. And Omoniyi V. I.
Year Published:
 2013
Abstract:

Nil

 
Publisher:
 International Journal For Information Security Research (IJISR)
Publication Type:
 Journal
Publication Title:
 DSGM-Based Analysis Of Computer Networks Security
Publication Authors:
 Boniface Kayode Alese, Iwasokun Gabriel Babatunde, Haruna Danjuma Israel
Year Published:
 2013
Abstract:

Nil