Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/2631
Full metadata record
DC FieldValueLanguage
dc.contributor.authorIsah, O. A.-
dc.contributor.authorAlhassan, John K-
dc.contributor.authorIsmaila, Idris-
dc.contributor.authorAdebayo, Olawale Surajudeen-
dc.date.accessioned2021-06-10T22:29:41Z-
dc.date.available2021-06-10T22:29:41Z-
dc.date.issued2018-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/2631-
dc.description.abstractThis paper presents a preliminary result of an ongoing research work on attack prevention and location of attacks on the cyberspace. The methodology combines the preventive encryption and locative algorithms. This paper in particular, present the reviews and methodology used in achieving the first objective of the said ongoing research. The existing systems duels on methodologies that attempt mostly postmortem solutions. Whereas, this research uses advanced encryption standard as prevention against compromising confidentiality. The methodology and objective obtained so far present a promising solution of unified model algorithm for real time solution of the ongoing research problemsen_US
dc.language.isoenen_US
dc.publisher1st CoNIMS International Conference and Workshop, Digital Security Considerations for Development (DISec 2018)en_US
dc.subjectRealtimeen_US
dc.subjectCyberspaceen_US
dc.subjectLocator agenten_US
dc.subjectDetectionen_US
dc.titleDetection of a Real - time Cyber- attack using Locator Agent Algorithmen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
Isah Perf Analy CoNIMS_Conference_2018_Proceedings.pdf2.56 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.