Richard Adeyemi Ikuesan

ORCID: 0000-0001-7355-2314
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital and Cyber Forensics
  • Advanced Malware Detection Techniques
  • User Authentication and Security Systems
  • Digital Media Forensic Detection
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Spam and Phishing Detection
  • Internet Traffic Analysis and Secure E-voting
  • Cybercrime and Law Enforcement Studies
  • Advanced Steganography and Watermarking Techniques
  • RFID technology advancements
  • Privacy, Security, and Data Protection
  • Data Quality and Management
  • Anomaly Detection Techniques and Applications
  • Adversarial Robustness in Machine Learning
  • Smart Grid Security and Resilience
  • Advanced Authentication Protocols Security
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • Opinion Dynamics and Social Influence
  • Generative Adversarial Networks and Image Synthesis
  • Bullying, Victimization, and Aggression
  • Technology and Data Analysis
  • Complex Network Analysis Techniques
  • Innovation in Digital Healthcare Systems

Zayed University
2022-2024

University of Pretoria
2016-2023

Community College of Qatar
2019-2022

ORCID
2020

University of Technology Malaysia
2012-2017

UNSW Sydney
2017

Voice cloning methods have been used in a range of ways, from customized speech interfaces for marketing to video games. Current voice systems are smart enough learn characteristics few samples and produce perceptually unrecognizable speech. These pose new protection privacy risks voice-driven interfaces. Fake audio has malicious purposes is difficult classify what real fake during digital forensic investigation. This paper reviews the issue deep-fake classification evaluates current...

10.1016/j.procs.2023.01.283 article EN Procedia Computer Science 2023-01-01

Database forensic investigation (DBFI) is an important area of research within digital forensics. It's importance growing as data becomes more extensive and commonplace. The challenges associated with DBFI are numerous, one the lack a harmonized process for investigators to follow. In this paper, therefore, we conduct survey existing literature hope understanding body work already accomplished. Furthermore, build on present using design science methodology. This has been developed based...

10.1109/access.2020.3000747 article EN cc-by IEEE Access 2020-01-01

For every contact that is made in a database, digital trace will potentially be left and most of the database breaches are mostly aimed at defeating major security goals (Confidentiality, Integrity, Authenticity) data reside database. In order to prove/refute fact during litigation, it important identify suitable investigation techniques can used link potential incident/suspect crime. As result, this paper has proposed steps constructing Integrated Incident Response Model (IIRM) relied upon...

10.1109/access.2020.3008696 article EN cc-by IEEE Access 2020-01-01

The emergence of unmanned aerial vehicles (also referred to as drones) has transformed the digital landscape surveillance and supply chain logistics, especially in terrains where such was previously deemed unattainable. Moreover, adoption drones further led proliferation diverse drone types drone-related criminality, which introduced a myriad security forensics-related concerns. As step towards understanding state-of-the-art research into these challenges potential approaches mitigation,...

10.3390/electronics10131519 article EN Electronics 2021-06-23

For reliable and relevant scientific evidence to be admitted in a court of law, it is important apply digital forensic investigation techniques corroborate suspected potential security incident. Mainly, traditional forensics have focused on computer desktops servers. However, recent advances media platforms seen an increased need for the application other subdomains including small mobile devices, databases, networks, cloud-based platforms, Internet Things (IoT). To assist investigators,...

10.1109/access.2021.3124262 article EN cc-by IEEE Access 2021-01-01

Internet of Things (IoT) are becoming commonplace in homes, buildings, cities, and nations, IoT networks also getting more complex interconnected. The complexity, interconnectivity, heterogeneity systems, however, complicate digital (forensic) investigations. challenge is compounded due to the lack holistic standardized approaches. Hence, building on ISO/IEC 27043 international standard, we present a forensic readiness (DFR) framework. We qualitatively evaluate utility proposed DFR

10.1016/j.fsir.2020.100117 article EN cc-by Forensic Science International Reports 2020-07-12

Machine learning has been shown as a promising approach to mine larger datasets, such those that comprise data from broad range of Internet Things devices, across complex environment(s) solve different problems. This paper surveys existing literature on the potential using supervised classical machine techniques, K-Nearest Neigbour, Support Vector Machines, Naive Bayes and Random Forest algorithms, in performing live digital forensics for IoT configurations. There are also number challenges...

10.1016/j.fsir.2020.100122 article EN cc-by Forensic Science International Reports 2020-07-15

Using a face validity approach, this paper provides validation of the Database Forensic Investigation Metamodel (DBFIM). The DBFIM was developed to solve interoperability, heterogeneity, complexity, and ambiguity in database forensic investigation (DBFI) field, where several models were identified, collected, reviewed develop DBFIM. However, lacked validity-based approach that could ensure DBFIM’s applicability DBFI field. completeness, usefulness, logic needed be validated by experts....

10.3390/infrastructures6020013 article EN cc-by Infrastructures 2021-01-20

Continuous and emerging advances in Information Communication Technology (ICT) have enabled Internet-of-Things (IoT)-to-Cloud applications to be induced by data pipelines Edge Intelligence-based architectures. Advanced vehicular networks greatly benefit from these architectures due the implicit functionalities that are focused on realizing Internet of Vehicle (IoV) vision. However, IoV is susceptible attacks, where adversaries can easily exploit existing vulnerabilities. Several attacks may...

10.3390/s21186018 article EN cc-by Sensors 2021-09-08

Securing digital evidence is a key factor that contributes to admissibility during forensic investigations, particularly in establishing the chain of custody evidence. However, not enough done ensure environment and access are secure. Attackers can go extreme lengths cover up their tracks, which serious concern forensics – readiness. If an attacker gains location where stored, they could easily alter (if remove it altogether). Even though integrity checks be performed sound, collected may...

10.1109/access.2022.3151403 article EN cc-by IEEE Access 2022-01-01

Integrating Internet of Things (IoT) devices into smart homes has necessitated the development novel strategies to address difficulties and complexities cyber-attacks privacy concerns in current digital threat landscape. One unaddressed challenge is lack clarity information collected stored by these IoT homes. The data storage process compliance home appliances, such as security cameras, thermostats, speakers, are examined this study. More specifically, study focuses on sensitive potential...

10.34190/iccws.20.1.3390 article EN cc-by-nc-nd International Conference on Cyber Warfare and Security 2025-03-24

Abstract The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless say, today’s dynamic, virtualized, complex environments, it has become undeniably necessary for administrators, analysts as well engineers practice vigilantism, on traffic other events reason understand the exact security posture an organization’s environment at any given time. This driven by fact that modern environments do,...

10.1007/s41870-020-00585-8 article EN cc-by International Journal of Information Technology 2020-12-05

Ransomware attacks have increased significantly in recent years, causing great destruction and damage to critical systems business operations. Attackers are unfailingly finding innovative ways bypass detection mechanisms, which encouraged the adoption of artificial intelligence. However, most research summarizes general features AI induces many false positives, as behavior ransomware constantly differs detection. Focusing on key indicating becomes vital this guides investigator inner...

10.34190/iccws.17.1.53 article EN cc-by-nc-nd International Conference on Cyber Warfare and Security 2022-03-02

Abstract A Cloud Forensic Readiness as a Service (CFRaaS) model allows an environment to preemptively accumulate relevant potential digital evidence (PDE) which may be needed during post‐event response process. The benefit of applying CFRaaS in cloud environment, is that, it designed prevent the modification/tampering architectures or infrastructure reactive process, if could, end up having far‐reaching implications. authors this article present process very costly exercise when must...

10.1002/wfs2.1372 article EN cc-by Wiley Interdisciplinary Reviews Forensic Science 2020-03-09

Currently, about half of all global enterprises are adopting and using some form cloud computing services. In computing, potential digital evidence is distributed across multiple isolated virtual machine instances. Investigating deleted or inactive instances a challenge to forensics, the traditional methods forensics inadequate address such forensic investigation. Users public (whether victim cyberattack, cybercriminal investigator) inherently communicate natural human language in sentences...

10.1080/00450618.2020.1789742 article EN Australian Journal of Forensic Sciences 2020-07-12

Complexity and sophistication among multimedia-based tools have made it easy for perpetrators to conduct digital crimes such as counterfeiting, modification, alteration without being detected. It may not be verify the integrity of video content that, example, has been manipulated digitally. To address this perennial investigative challenge, paper proposes integration a forensically sound push button forensic modality (PBFM) model investigation MP4 file format step towards automated...

10.3390/infrastructures6040054 article EN cc-by Infrastructures 2021-04-02

<span>User attribution, the process of identifying a human in digital medium, is research area that has receive significant attention information security areas, with little focus on forensics. This study explored probability existence fingerprint based thinking style, which can be used to identify an online user. To achieve this, utilized Server-side web data 43-respondents were collected for 10-months as well self-report style measurement instrument. Cluster dichotomies from five styles...

10.18517/ijaseit.7.1.1383 article EN cc-by-sa International Journal on Advanced Science Engineering and Information Technology 2017-02-02

Comprehension of the statistical and structural mechanisms governing human dynamics in online interaction plays a pivotal role user identification, profile development, recommender systems. However, building characteristic model on Internet involves complete analysis variations activity patterns, which is complex process. This complexity inherent has not been extensively studied to reveal composition behavior. A typical method anatomizing such system viewing all independent interconnectivity...

10.1371/journal.pone.0166930 article EN cc-by PLoS ONE 2016-12-05

The relationship between negative and positive connotations with regard to malware in the cloud is rarely investigated according prevailing literature. However, there a significant use of connotations. A clear distinction two emanates when we originally considered malicious code, for connotation like case capturing keystrokes proactive forensic purpose. This done during collection digital evidence Digital Forensic Readiness (DFR) purposes, preparation Investigation (DFI) process. paper...

10.1109/iciot48696.2020.9089494 article EN 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) 2020-02-01

Even though the cloud paradigm and its associated services has been adopted in various enterprise applications, there major issues with regard to authenticating users' critical data. Single Sign on (SSO) is a user authentication technique through which server authenticates allows use single aspect of login credentials, for example, access multiple cloud. SSO reduces number logins that are needed over heterogeneous environments, risk might be security detrimental if, Man-in-the Middle (MITM)...

10.1145/3386723.3387875 article EN 2020-03-31
Coming Soon ...