Funminiyi Olajide

ORCID: 0000-0003-1627-6637
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital and Cyber Forensics
  • Advanced Malware Detection Techniques
  • User Authentication and Security Systems
  • Digital Media Forensic Detection
  • Big Data and Business Intelligence
  • Advanced Authentication Protocols Security
  • Network Security and Intrusion Detection
  • Security and Verification in Computing
  • Coding theory and cryptography
  • Internet Traffic Analysis and Secure E-voting
  • Digital Transformation in Industry
  • Spam and Phishing Detection
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Access Control and Trust
  • Cloud Data Security Solutions
  • Wireless Body Area Networks
  • Insurance and Financial Risk Management
  • Chaos-based Image/Signal Encryption
  • Cryptographic Implementations and Security
  • Cryptography and Data Security
  • Cybercrime and Law Enforcement Studies
  • Privacy, Security, and Data Protection
  • Hate Speech and Cyberbullying Detection
  • Advanced Data Storage Technologies

University of Westminster
2025

Nottingham Trent University
2016-2024

National Open University of Nigeria
2016

Covenant University
2016

University of Portsmouth
2009-2013

The banking sector is a very important in our present day generation where almost every human has to deal with the bank either physically or online. In dealing banks, customers and banks face chances of been trapped by fraudsters. Examples fraud include insurance fraud, credit card accounting etc. Detection fraudulent activity thus critical control these costs. This paper hereby addresses detection via use data-mining techniques, association, clustering, forecasting, classification analyze...

10.1109/csci.2016.0224 article EN 2021 International Conference on Computational Science and Computational Intelligence (CSCI) 2016-12-01

10.14569/ijacsa.2025.0160103 article EN International Journal of Advanced Computer Science and Applications 2025-01-01

The WannaCry ransomware attack of May 2017 marked a critical turning point in cybersecurity history, prompting profound ethical discussions about software vulnerability management. This comprehensive analysis examines the dimensions incident, focusing on responsibilities government agencies, technology companies, and security professionals handling zero-day vulnerabilities. study investigates complex balance between national interests global while proposing frameworks for future practice....

10.34190/iccws.20.1.3353 article EN cc-by-nc-nd International Conference on Cyber Warfare and Security 2025-03-24

Technological advancement has undoubtedly impacted humanity in different ways influencing the way things are done. This informed transition of traditional manual procurement processes to internet-enabled e-procurement systems which is fast gaining popularity and acceptance across globe because enormous benefits therein. However, cybercriminals, taking advantage technology, have become more sophisticated their antics thereby necessitating need for study into cybersecurity mitigation methods...

10.58806/ijsshmr.2025.v4i3n19 article EN other-oa International Journal of Social Science Humanity & Management Research 2025-03-28

Now-a-days, network security is becoming an increasingly significant and demanding research area of interest. Threats attacks on information Internet are getting difficult to detect. As a result, encryption has emerged as solution now plays critical role in systems. Many techniques required safeguard shared data. In this work, the encryption, decryption times, throughput (speed) three most commonly used block cipher algorithms: Twofish, Blowfish, AES were investigated using different file...

10.14569/ijacsa.2023.0140344 article EN International Journal of Advanced Computer Science and Applications 2023-01-01

Most of the effort in today's digital investigations centres on data collection and analysis existing information from hard disks computer systems. Little has been done level that can be recovered only system memory (RAM) while application is still running. In this paper, we present results an investigation into extraction forensically relevant physical memory. We also our findings most commonly used applications a windows system. The extracted relates to what user was doing at time capture,...

10.1109/worldcis17046.2011.5749861 article EN 2011-02-01

Wireless Mesh Networks (WMNs) integrate the advantages of WLANs and mobile Ad Hoc networks, which have become key techniques next-generation wireless networks in context emergency recovery. are multi-hop with instant deployment, self-healing, self-organization self-configuration features. These capabilities make WMNs a promising technology for incident communication. An area network (IAN) needs reliable lively routing path during disaster recovery response operations when...

10.1371/journal.pone.0204751 article EN cc-by PLoS ONE 2018-10-15

The impact of emerging technology on organisations has caused technological disruption to business processes. It is therefore required develop better measures improve and speed up processes for performance competitive purposes. Intelligent Automation an concept that focuses organisational workflow via the integration Artificial Intelligence Machine Learning, effective operability decision-making Focusing process adaptability, this study aims at proposing a framework systems. Outcomes could...

10.1109/icict55905.2022.00010 article EN 2022-03-01

Extraction of user information in the physical memory Windows application is vital today's digital investigation. Digital forensic community feels urge for development tools and techniques volatile analysis. However, there have been few investigations into amount relevant that can be recovered from memory. In this research, we present quantitative qualitative results experiments carried out on applications. conducting research; identified most commonly used applications systems, designed a...

10.1109/i-society18435.2011.5978501 article EN 2011-06-01

Information security has emerged as a critical concern in data communications.The use of cryptographic methods is one approach for ensuring security.A cryptography implementation often consists complex algorithms that are used to secure the data.Several techniques, including Data Encryption Standard (DES), Triple (3DES), Twofish, Rivest-Shamir-Adleman (RSA), Elliptic curve cryptography, and many others, have been created encryption process.However, Advanced (Rijndael) received lot attention...

10.5120/ijca2023922941 article EN International Journal of Computer Applications 2023-07-20

Technological turbulence caused by digital transformation has brought about the utilisation of enterprise agility for IT/IS technologies organisation performance. Enterprise Agility adaptability to sense and respond changes. This research aims at implementing an emerging technology type sustainability, predict organisational future towards competitive advantages. Using a quantitative analysis, under positive paradigm, this will develop model analysing output gained. To analyse Key...

10.23919/cisti49556.2020.9141142 article EN 2022 17th Iberian Conference on Information Systems and Technologies (CISTI) 2020-06-01

Forensic investigation of the physical memory computer systems is gaining attention experts in digital forensics community.Forensic investigators find it helpful to seize and capture data from perform post-incident analysis when identifying potential evidence.However, there have been few investigations which identified quantity quality information that can be recovered only system (RAM) while application still running.In this paper, we present results carried out identify relevant has...

10.20533/ijisr.2042.4639.2012.0020 article EN International Journal for Information Security Research 2012-09-01

Objectives: This paper investigates the amount of user input that can be recovered from volatile memory Windows computer systems while an application is still running. Additionally, investigation into temporal, functional analysis and event reconstruction activities in business discussed reported upon. Methods/Analysis: Forensically, relevant information suitable for evidentiary purpose. Therefore, qualitative assessment on commonly used windows-based applications presented. Findings: In...

10.17485/ijst/2016/v9i25/95211 article EN Indian Journal of Science and Technology 2016-07-14
Coming Soon ...