期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Development of multiple mobile networks call detailed records and its forensic analysis
1
作者 Emmanuel Abba A.M.Aibinu J.K.Alhassan 《Digital Communications and Networks》 SCIE 2019年第4期256-265,共10页
Call Detailed Records(CDR)are generated and stored in Mobile Networks(MNs)and contain subscriber’s information about active or passive usage of the network for various communication activities.The spatio-temporal nat... Call Detailed Records(CDR)are generated and stored in Mobile Networks(MNs)and contain subscriber’s information about active or passive usage of the network for various communication activities.The spatio-temporal nature of CDR makes them a valuable dataset used for forensic activities.Advances in technology have led to the seamless communication across Multiple Mobile Network(MMN),which poses a threat to the availability and integrity of CDR data.Present CDR implementation is capable of logging peer-to-peer communications over single connection only,thus necessitating improvements on how the CDR data is stored for forensic analysis.In this paper,the problem is solved by identifying and conceptually modelling six new artifacts generated by such communication activities.The newly identified artifacts are introduced into the existing CDR for an incident capturing of the required data for forensic analysis during investigations involved in the MMN communication.Results show an improved absolute speed of 0.0058 s for the MMN-CDR to associate a suspect with an incident,which is 0.0038 s faster than the speed of 0.0097s for the existing CDR to associate a suspect with an accomplice.Thus,a novel method for forensically tracking calls over the MMN has been developed.The MMN-CDR,when forensically analyzed,reveals an increase in time efficiency over the existing CDR due to its high absolute speed.Also,higher accuracy and completeness percentage are both obtained. 展开更多
关键词 CDR INVESTIGATION Multiple mobile networks SUSPECT
下载PDF
Web Application Authentication Using Visual Cryptography and Cued Clicked Point Recall-based Graphical Password
2
作者 Mary Ogbuka Kenneth Stephen Michael Olujuwon 《Journal of Computer Science Research》 2021年第3期29-41,共13页
Alphanumerical usernames and passwords are the most used computer authentication technique.This approach has been found to have a number of disadvantages.Users,for example,frequently choose passwords that are simple t... Alphanumerical usernames and passwords are the most used computer authentication technique.This approach has been found to have a number of disadvantages.Users,for example,frequently choose passwords that are simple to guess.On the other side,if a password is difficult to guess,it is also difficult to remember.Graphical passwords have been proposed in the literature as a potential alternative to alphanumerical passwords,based on the fact that people remember pictures better than text.Existing graphical passwords,on the other hand,are vulnerable to a shoulder surfing assault.To address this shoulder surfing vulnerability,this study proposes an authentication system for web-applications based on visual cryptography and cued click point recall-based graphical password.The efficiency of the proposed system was validated using unit,system and usability testing measures.The results of the system and unit testing showed that the proposed system accomplished its objectives and requirements.The results of the usability test showed that the proposed system is easy to use,friendly and highly secured. 展开更多
关键词 Password authentication Graphical password Text password Visual cryptography Shoulder surfing Key-logging
下载PDF
Student Performance Prediction Using A Cascaded Bi-level Feature Selection Approach
3
作者 Wokili Abdullahi Mary Ogbuka Kenneth Morufu Olalere 《Journal of Computer Science Research》 2021年第3期16-28,共13页
Features in educational data are ambiguous which leads to noisy features and curse of dimensionality problems.These problems are solved via feature selection.There are existing models for features selection.These mode... Features in educational data are ambiguous which leads to noisy features and curse of dimensionality problems.These problems are solved via feature selection.There are existing models for features selection.These models were created using either a single-level embedded,wrapper-based or filter-based methods.However single-level filter-based methods ignore feature dependencies and ignore the interaction with the classifier.The embedded and wrapper based feature selection methods interact with the classifier,but they can only select the optimal subset for a particular classifier.So their selected features may be worse for other classifiers.Hence this research proposes a robust Cascade Bi-Level(CBL)feature selection technique for student performance prediction that will minimize the limitations of using a single-level technique.The proposed CBL feature selection technique consists of the Relief technique at first-level and the Particle Swarm Optimization(PSO)at the second-level.The proposed technique was evaluated using the UCI student performance dataset.In comparison with the performance of the single-level feature selection technique the proposed technique achieved an accuracy of 94.94%which was better than the values achieved by the single-level PSO with an accuracy of 93.67%for the binary classification task.These results show that CBL can effectively predict student performance. 展开更多
关键词 RELIEF Particle swarm optimization Cascaded bi-level Educational data mining Binary-level grading Five-level grading
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部