0704-883-0675     |      dataprojectng@gmail.com
1

1. THE EXTENT OF LIABILITY OF BANKS FOR E-BANKING FRAUD

Background to the study

With the global use of progressively more sophisticated internet and information technology (Papazoglou, 2003), electronic banking is developing as a key channel for banking businesses (Wei et al., 2012). Globally, remote banking...

Read more

2. CRITICAL INFORMATION INFRASTRUCTURE PROTECTION TECHNIQUES IMPLEMENTATION AGAINST CYBER ATTACKS USING BIG DATA ANALYTICS (A CASE STUDY OF INEC & JAMB)

Introduction

In 2016, BT, the telecoms company that owns and maintains the physical infrastructure that makes up the UK's broadband network, experienced an outage of a portion of its broadband services, causing hundreds of thousands of customers (in...

Read more

3. THE ASSESSMENT OF BIG DATA ANALYTICS ROLE AS A PROTECTION TECHNIQUE AGAINST CYBER ATTACKS (A CASE STUDY OF JAMB)

BACKGROUND OF THE STUDY

Cyber-attacks are constantly making headlines, putting countries, industries, and businesses at danger of security breaches. With society's reliance on technology and the introduction of the internet, things could get even wo...

Read more

4. biometric authentication of an automated teller machine using finger print and password

Statement of the Problem

The existing system is plagued with the following problems;

 

  1. Traditional authentication systems cannot discriminate between an impostor who fraudulently obtains the access privileges and the real owner.
  2. <...
Read more

5. biometric authentication of an automated teller machine using finger print and password

Statement of the Problem

The existing system is plagued with the following problems;

 

  1. Traditional authentication systems cannot discriminate between an impostor who fraudulently obtains the access privileges and the real owner.
  2. <...
Read more

6. A SOLDER-DEFINED COMPUTER ARCHITECTURE FOR BACKDOOR AND MALWARE RESISTANCE

ABSTRACT

Abel, Marc W. Ph.D. Department of Computer Science and Engineering, Wright State University, 2022. A Solder-Defined Computer Architecture for Backdoor and Malware Resistance. This research is about securing control of those devices we most depend on for integrity and confidenti...

Read more

7. FEW-SHOT MALWARE DETECTION USING A NOVEL ADVERSARIAL REPROGRAMMING MODEL

ABSTRACT 

The increasing sophistication of malware has made detecting and defending against new strains a major challenge for cybersecurity. One promising approach to this problem is using machine learning techniques that extract representative features and train classification mod...

Read more

8. AI-DRIVEN TECHNIQUES FOR MALWARE AND MALICIOUS CODE DETECTION

ABSTRACT

Driven by considerable economic profits, there has been explosive growth of malware which has posed significant damages and finical losses to public users. The increasingly sophisticated malware call for new defensive techniques that are capable of protecting l...

Read more

9. DESIGN AND IMPLEMENTATION OF NETWORK INTRUSION DETECTION SYSTEM (NIDS)

ABSTRACT

The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...

Read more
whatsapp