S/N |
Paper Title and Authors |
Pages |
DOI |
1 |
Achieving Sustainable Development Goals from a Cybersecurity Perspective
John O. Odumesi and Sanusi Bayonle Saheed
|
1 - 10 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P3 |
2 |
A Machine Learning Approach to Fake News Detection Using Support Vector Machine (SVM) and Unsupervised Learning Model
Hosea Isaac Gungbias, Victor Onomza Waziri, Idris Ismaila, Joseph Ojeniyi, Morufu Olalere and Olawale Adebayo
|
11 - 18 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P1 |
3 |
Performance Evaluation of Random Forest Algorithm for DDOS Attacks Detection in Wireless Sensor Network Using Numericalization and Normalization as Feature Engineering Techniques
Sulaiman Hamza, Ishaq Oyebisi Oyefolahan, Bashir Sulaimon Adebayo, Idris Mohammed Kolo and Ndunagu J. N
|
19 - 26 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P2 |
4 |
Detection of Algorithmically Generated Domain Names using Ensemble Machine Learning Technique
Abdullahi Samaila Musa, Mohammed Abdullahi, Ibrahim Rukayya Yahaya and Shamsuddeen Adamu
|
27 - 34 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P4 |
5 |
Rethinking Your Application Security Posture, from Code to Cloud
Oluwatobi Afolabi
|
35 - 40 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P5 |
6 |
Cloud Application Security: Best Practices to Implement and Pitfalls to Avoid
Eseroghene J Oyitso and Eboseluime D Ordia
|
41 - 48 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P6 |
7 |
Internet of Things (IoT) Security and Private Concerns: An Overview
Olumoye Mosud, Emmanuel B. Ajulo and Aishat B. Yinusa
|
49 - 58 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P7 |
8 |
A Brief Overview on Applications of Multi-Criteria Decision Making Methods in Web Application Security
S.A. Adepoju, O.A. Abisoye, A.O. Ojerinde and A.O. Abdulraheem,
|
59 - 66 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P8 |
9 |
Addressing the Dilemma of a “Crisis within a crisis”: Exploring the Penetration Testing challenges in a Mobile Field Hospital Setting
Nasir Baba Ahmed, Nicolas Daclin, Marc Olivaux and Gilles Dusserre
|
67 - 80 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P9 |
10 |
Development of a Fake News Detection Model Using Decision Tree Algorithm
Adeola, Olajide O., Bello, Ganiyat R., Oluwasola, Babatunde S. and Lateef, Kafayat R.
|
81 - 89 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P10 |
11 |
A Proactive Approach to Addressing Security Challenges in Cloud Migration
Janet Njoku
|
90 - 96 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P11 |
12 |
The Legal Framework For Cybersecurity in Nigeria: Adapting The Fourth Industrial Revolution
Pamela Victor Ibitamuno
|
97 - 104 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P12 |
13 |
Trend and Emerging Types of '419' Scams
Polra Victor Falade
|
105 - 114 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P13 |
14 |
Organization Studies Based Appraisal of Institutional Propositions in the Nigeria Data Protection Regulation
Sumayya Babangida Sabo and Samuel C. Avemaria Utulu
|
115 - 124 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P18 |
15 |
Evaluating Government Strategies For Child Online Protection
Moses Joshua
|
125 - 134 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P115 |
16 |
A Digital Transformative Tool in Achieving Sustainable Development Goals Olasehinde Victor Moboluwarin
|
135 - 142 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P16 |
17 |
Cybercrime on Social Media in Nigeria: Trends, Scams, Vulnerabilities and Prevention
Oni Damilola, Arshad Emmanuel and Pham Bich Ngoc
|
143 - 150 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P17 |
18 |
Exploring the Effectiveness of Cybersecurity Training Programs: Factors, Best Practices, and Future Directions
Sadiq Nasir
|
151 - 160 |
dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P18 |