ABSTRACT
This study examined the role of corporate governance in organizations, and how the public confidence can be restored in organization through financial reporting. The study aimed at ascertaining the extent to which financial helps organizations...
Introduction
In 2016, BT, the telecoms company that owns and maintains the physical infrastructure that makes up the UK's broadband network, experienced an outage of a portion of its broadband services, causing hundreds of thousands of customers (in...
Abstract
The advancement of computers produce computing infrastructures which handle resources in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distributed architectures becomes an attractive target for...
INTRODUCTION
As Green IT has been issued, many companies have started to find ways to decrease IT cost and overcome economic recession. Cloud Computing service is a new computing paradigm in which people only need to pay for use of services without cost of purchasing ph...
INTRODUCTION
Vegetables are an essential food product that are both economically important and nutritionally significant. Vegetables naturally play an important part in human nutrition by delivering the required growth factors in the form of vitamins and key minerals in...
Background of the study
After the civil war that broke out in 1970 in Nigeria, the country's security situation has been generally stable ever since. The people have peace, and they are able to travel freely from one section of the nation to another without being ha...
Background Of The Study
According to Chan (2022), safety is a state in which risks and conditions that might cause physiological, mental, or physical harm are limited to safeguard the health and well-being of individuals. It is an essential resource for...
Introduction
An intrusion detection system (IDS) analyses network traffic for unusual behaviour and alerts the system or network administrator if it detects it. In some situations, the IDS may respond to suspicious or malicious activity by prohibiting the user or source...
BACKGROUND OF THE STUDY
Cyber-attacks are constantly making headlines, putting countries, industries, and businesses at danger of security breaches. With society's reliance on technology and the introduction of the internet, things could get even wo...
ABSTRACT
This work was preoccupied with the examination of malicious prosecution under the Nigerian law. It pointed out that malicious prosecution is an abuse of the process of the court by wrongfully setting the law in motion on a criminal charge. It is the malicious i...
Introduction
An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alert the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by...
ABSTRACT
This research aimed at the development of a modified real-time fault-tolerant task allocation scheme (mRFTAS) for wireless sensor networks (WSNs), using active replication backup techniques. In WSNs, the sensor nodes are at risk of failure and malicious attacks (selective forwa...
Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance i...
Abstract
Institution of higher education face a higher level of information security incidence and compromise such as data and information theft, malicious program infection, attack on the information systems infrastructure and computer network. The antagonistic impact of information se...
ABSTRACT
The increasing sophistication of malware has made detecting and defending against new strains a major challenge for cybersecurity. One promising approach to this problem is using machine learning techniques that extract representative features and train classification mod...
ABSTRACT
Content Centric Networking (CCN) is a novel networking approach that aims at overcoming some of the limitations of the current Internet. In particular, CCN aims at providing better security and privacy by focusing on the data rather than on the location of data. However, this n...
Abstract
Trusted Execution Environment (TEE) is a blooming direction in the cloud industry. Aiming at protecting cloud user’s data in runtime, TEE can enable a lot of new and foreseeable cloud use cases. While enclave-based TEEs such as Intel SGX suffer from a large effort of rewr...
ABSTRACT
Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining pro...
ABSTRACT
With the presence of some faults in online protocols and operating systems, any person who is connected to a network, especially in a Local Area Network (LAN) can fall victim to his information getting monitored by another person that is connected to the same network. Due to th...
ABSTRACT
Driven by considerable economic profits, there has been explosive growth of malware which has posed significant damages and finical losses to public users. The increasingly sophisticated malware call for new defensive techniques that are capable of protecting l...
ABSTRACT
The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...
Background of the Study
The increasing role of digital platforms in political protests and governance issues has become a significant area of focus, especially in developing countries like Nigeria. Over the past decade, social media pla...