- Digital and Cyber Forensics
- Advanced Malware Detection Techniques
- User Authentication and Security Systems
- Digital Media Forensic Detection
- Big Data and Business Intelligence
- Advanced Authentication Protocols Security
- Network Security and Intrusion Detection
- Security and Verification in Computing
- Coding theory and cryptography
- Internet Traffic Analysis and Secure E-voting
- Digital Transformation in Industry
- Spam and Phishing Detection
- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Access Control and Trust
- Cloud Data Security Solutions
- Wireless Body Area Networks
- Insurance and Financial Risk Management
- Chaos-based Image/Signal Encryption
- Cryptographic Implementations and Security
- Cryptography and Data Security
- Cybercrime and Law Enforcement Studies
- Privacy, Security, and Data Protection
- Hate Speech and Cyberbullying Detection
- Advanced Data Storage Technologies
University of Westminster
2025
Nottingham Trent University
2016-2024
National Open University of Nigeria
2016
Covenant University
2016
University of Portsmouth
2009-2013
The banking sector is a very important in our present day generation where almost every human has to deal with the bank either physically or online. In dealing banks, customers and banks face chances of been trapped by fraudsters. Examples fraud include insurance fraud, credit card accounting etc. Detection fraudulent activity thus critical control these costs. This paper hereby addresses detection via use data-mining techniques, association, clustering, forecasting, classification analyze...
The WannaCry ransomware attack of May 2017 marked a critical turning point in cybersecurity history, prompting profound ethical discussions about software vulnerability management. This comprehensive analysis examines the dimensions incident, focusing on responsibilities government agencies, technology companies, and security professionals handling zero-day vulnerabilities. study investigates complex balance between national interests global while proposing frameworks for future practice....
Technological advancement has undoubtedly impacted humanity in different ways influencing the way things are done. This informed transition of traditional manual procurement processes to internet-enabled e-procurement systems which is fast gaining popularity and acceptance across globe because enormous benefits therein. However, cybercriminals, taking advantage technology, have become more sophisticated their antics thereby necessitating need for study into cybersecurity mitigation methods...
Now-a-days, network security is becoming an increasingly significant and demanding research area of interest. Threats attacks on information Internet are getting difficult to detect. As a result, encryption has emerged as solution now plays critical role in systems. Many techniques required safeguard shared data. In this work, the encryption, decryption times, throughput (speed) three most commonly used block cipher algorithms: Twofish, Blowfish, AES were investigated using different file...
Most of the effort in today's digital investigations centres on data collection and analysis existing information from hard disks computer systems. Little has been done level that can be recovered only system memory (RAM) while application is still running. In this paper, we present results an investigation into extraction forensically relevant physical memory. We also our findings most commonly used applications a windows system. The extracted relates to what user was doing at time capture,...
Wireless Mesh Networks (WMNs) integrate the advantages of WLANs and mobile Ad Hoc networks, which have become key techniques next-generation wireless networks in context emergency recovery. are multi-hop with instant deployment, self-healing, self-organization self-configuration features. These capabilities make WMNs a promising technology for incident communication. An area network (IAN) needs reliable lively routing path during disaster recovery response operations when...
The impact of emerging technology on organisations has caused technological disruption to business processes. It is therefore required develop better measures improve and speed up processes for performance competitive purposes. Intelligent Automation an concept that focuses organisational workflow via the integration Artificial Intelligence Machine Learning, effective operability decision-making Focusing process adaptability, this study aims at proposing a framework systems. Outcomes could...
Extraction of user information in the physical memory Windows application is vital today's digital investigation. Digital forensic community feels urge for development tools and techniques volatile analysis. However, there have been few investigations into amount relevant that can be recovered from memory. In this research, we present quantitative qualitative results experiments carried out on applications. conducting research; identified most commonly used applications systems, designed a...
Information security has emerged as a critical concern in data communications.The use of cryptographic methods is one approach for ensuring security.A cryptography implementation often consists complex algorithms that are used to secure the data.Several techniques, including Data Encryption Standard (DES), Triple (3DES), Twofish, Rivest-Shamir-Adleman (RSA), Elliptic curve cryptography, and many others, have been created encryption process.However, Advanced (Rijndael) received lot attention...
Technological turbulence caused by digital transformation has brought about the utilisation of enterprise agility for IT/IS technologies organisation performance. Enterprise Agility adaptability to sense and respond changes. This research aims at implementing an emerging technology type sustainability, predict organisational future towards competitive advantages. Using a quantitative analysis, under positive paradigm, this will develop model analysing output gained. To analyse Key...
Forensic investigation of the physical memory computer systems is gaining attention experts in digital forensics community.Forensic investigators find it helpful to seize and capture data from perform post-incident analysis when identifying potential evidence.However, there have been few investigations which identified quantity quality information that can be recovered only system (RAM) while application still running.In this paper, we present results carried out identify relevant has...
Objectives: This paper investigates the amount of user input that can be recovered from volatile memory Windows computer systems while an application is still running. Additionally, investigation into temporal, functional analysis and event reconstruction activities in business discussed reported upon. Methods/Analysis: Forensically, relevant information suitable for evidentiary purpose. Therefore, qualitative assessment on commonly used windows-based applications presented. Findings: In...