Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/12221
Full metadata record
DC FieldValueLanguage
dc.contributor.authorIsah, Abdulkadir O.-
dc.contributor.authorAlhassan, John K-
dc.contributor.authorIsmaila, Idris-
dc.contributor.authorAdebayo, Olawale Surajudeen-
dc.contributor.authorOnuja, Abdulkadir S.-
dc.date.accessioned2021-08-01T15:38:00Z-
dc.date.available2021-08-01T15:38:00Z-
dc.date.issued2019-09-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/12221-
dc.description.abstractThis paper is a presentation of part of the preliminary achievement of an ongoing research work by the authors. The said research work is on tracking and locating Cyber attacks in general. This very paper seeks to propose a solution to the security challenges of Oil and gas industry is in no doubt you ne of the most lucrative industries and high income generation for almost all oil and gas producing countries of the world, since most of the operation of oil and gas industry is information and technology driven, the accompany security challenges of the IT are mostly targeted at the upstream, the midstream, and downstream sectors. The methodology employed is a system design of a developed algorithm of data and server application tracking. The methodology implementation trials of the research so far, proved the final result could be implemented to solve a wide range of Cyber Security problem especially, in the area of tracking and locating instantaneous malicious attacks on data files and software applications in the Cyber space.en_US
dc.language.isoenen_US
dc.publisher3rd International Engineering Conference (IEC 2019), Federal University of Technology, Minna, Nigeriaen_US
dc.subjectVulnerabilityen_US
dc.subjectCritical Infrastructuresen_US
dc.subjectTracking Algorithmen_US
dc.subjectMalicious Attacksen_US
dc.titleInvestigation of Vulnerability of Oil and Gas Critical Infrastructures and Developing a Tracking Algorithm to track Malicious Attacks on the Streamsen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
Isah 3rd IEC 2019.pdf2.37 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.