Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/11976
Full metadata record
DC FieldValueLanguage
dc.contributor.authorIsah, O.A-
dc.contributor.authorAlhassan, J.K-
dc.contributor.authorIsmaila, Idris-
dc.contributor.authorAdebayo, O. S-
dc.contributor.authorOnuja, A. M-
dc.date.accessioned2021-07-28T13:18:15Z-
dc.date.available2021-07-28T13:18:15Z-
dc.date.issued2019-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/11976-
dc.description.abstractThis paper is a presentation of part of the preliminary achievement of an ongoing research work by the authors. The said research work is on tracking and locating cyber-attacks in general. This very paper seek to propose a solution to security challenges of oil and gas industry is no doubt one of the most lucrative industries and high income generator for almost all oil and gas producing countries of the world since most of the operation of oil and gas industry is information technology driven, the accompanying cyber security challenges of the information technologies are mostly targeted at the upstream, the midstream and the downstream sector of the oil and gas industry. the methodology employed is a system design of a developed algorithm of data server application tracking .The methodology and implementation trials of the ongoing research work so far, proved that the final result could be implementation to solve a wide range of cyber security problems especially, in the area of tracking and locating instantaneous malicious attacks of data files or software applications on the cyber space.en_US
dc.language.isoenen_US
dc.publisher3rd International Engineering Conference (IEC 2019)en_US
dc.relation.ispartofseries;573-580-
dc.subjectVulnerability, Critical Infrastructures, Inter-Streams, Tracking, Malicious Attacks, Agents, Encryption.en_US
dc.titleInvestigation of Vulnerabilities of Oil and Gas Critical Infrastructures and Developing a Tracking Algorithm to Track Malicious Attacks on the Stream.en_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
OIL AND GAS.pdfVULNERABILITY, CRITICAL INFRASTRUCTURES, INTER-STREAMS, TRACKING, MALICIOUS ATTACKS, AGENTS, ENCRYPTION.2.37 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.