Academic Papers and Presentations

Page 1 of 5

  • Implementing a Mobile-Based Child-Birth Registration System in Nigeria, The International Journal of Computer and Information. Vol. 4 http://ijcit.com


Read more in pdf format

  • Towards the Development of a Time-Out Multiple C-R CAPTCHA Framework Using Integrated Mathematical Modeling. Afr J Comp & ICTs, Vol 8 No 2. www.ajocict.net


Read more in pdf format

  • Students’ Attitudes towards Wait Times in Students’ Health Centers – The Case for Pseudo Aggravated Sicknesses. Computing, Information Systems & Development Informatics Journal. Vol 5, No 2 June, 2015. www.cisdijournal.net

Read more in pdf format

  • Strategic Sensor Placement for Intrusion Detection in Network-Based IDS. I.J. Intelligent Systems and Applications, 2014, 02, 61-68. Published Online January 2014 in MECS (http://www.mecs-press.org/). DOI: 10.5815/ijisa.2014.02.08

Read more in pdf format

  • Integrating Social Media Use in Secondary School Education. Journal of Advances in Scientific Research & Applications.

Read more in pdf format

  • The Boko Haram Insurgency in Nigeria: A Security Officers Perspective on Technology & The American Angle. CISDIAR Journal, Vol 5, no 2, June, 2014. www.cisdiarjournal.net

    Read more in pdf format

  • Framework for Understanding Supervisory Control and Data Acquisition (SCADA) Systems. International Journal of Computer Science and Management Research Vol 2 Issue 1 http://www.ijcsmr.org/vol2issue1/paper196.pdf

Read more in pdf format

  • Mitigating Socially Engineered Cyber Deception and Theft: An Ethnographic Approach. Information Technology in Developing Countries, IFIP Publication - Vol. 22, No. 3. www.iimahd.ernet.in/egov/ifip/nov2012/longe.htm

Read more in pdf format

  • Hunter Hunted - Mitigating Phishing Attacks Using “PhishermanPro. Journal of Computer Science and Its Applications. Journal of the Nigerian Computer Society. Vol 19. No. 1, 2012

Read more in pdf format

 

  • On the Design of A URL Capturing Tool for Monitoring Enterprise Networks. Journal of Advanced Research in Computer Science. Volume 3, No 2. March 2012. http://www.ijarcs.info/

Read more in pdf format

  • A Sobel Edge Detection Algorithm Based System for Analyzing and Classifying Image Based Spam. Journal of Emerging Trends in Computing and Information Sciences. Vol 3. No. 2. http://cisjournal.org/journalofcomputing/archive/vol3no4/vol3no4_6.pdf

Read more in pdf format

  • Framework for Profiling User Instant Messaging Behaviour on Anonymous Peer to Peer Networks. Under Consideration by the Int. Journal of Advanced Research in Computer Science. http://www.ijarcs.info/

Read more in pdf format

  • A Similarity Threshold-based Tool for Generating and Assessing Essay Computer-Based Examination. Library Philosophy & Practice Journal – August 2012 Volume . http://digitalcommons.unl.edu/libphilprac/793

Read more in pdf format

  • Deindividuation, Anonymity and Unethical Behavior in Cyber Space – Explorations in the Valley of Digital Temptations. Computing & Information Systems Vol. 16. Issue 3 No. 1. http://cis.uws.ac.uk/research/journal/index.html

Read more in pdf format.

  • A Prototype Scalable System for Secured Bulk SMS Delivery on Mobile Networks. Vol. 3 No. 1 Int. Journal of Advanced Research in Computer Science. http://www.ijarcs.info/

Read more in pdf format.

  • Service Enterprises, Social Engineering and Workforce Productivity – The Case of Zain Nigeria PLC. Computing, Information Systems & Development Informatics Journal.Vol 3, No.1. pp 15-18

Read more in pdf format.

  • Factor Analysis For G.S.M. Services Congestion –The Case Of MTN Nigeria. Computing & Information Systems http://cis.uws.ac.uk/research/journal/index.html

Read more in pdf format.

  • An Open Source Freeware E-Mail To SMS Alert System for Mobile Platforms. Afr J. of Comp & ICTs. Vol 5, No. 2. pp 51-60. www.ajocict.net

Read more in pdf format.

  • On the use of Image-based Spam Mails as Carriers for Covert Data Transmission. Computer & Information Systems Journal. Vol. 15. Issue 1. http://cis.uws.ac.uk/research/journal/vol15.htm

Read more in pdf format.

  • Scalable Knock Authentication Mechanism (SKAM) for Addressing TCP and UDP Probe Vulnerabilities in Open Networks. Afr J. of Comp & ICTs. Vol 4, No. 1 pp 45- 50.

Read more in pdf format.

  • Computer Approach to Analysis and Solution of Graphical Problems in Mathematics. Asian Journal of Information Technology, 10: 36-41. http://www.medwelljournals.com/abstract/?doi=ajit.2011.36.41

Read more in pdf format.

  • On the Origins of Advance Fee Fraud Electronic Mails: A Technical Investigation Using Internet Protocol Address Tracers," The African Journal of Information Systems: Vol. 3: Iss. 1, Article 2. http://digitalcommons.kennesaw.edu/ajis/vol3/iss1/2

Read more in pdf format.

Next

 

Caleb University
Imota, Lagos, Nigeria
234-01-2910684, 234-01-2910686
234-01-291068