2021 Conference Paper Title

  1. TECHNOLOGY PERSPECTIVE OF BEHAVIORAL ATTRIBUTES ON E-COMMERCE SITES DURING PANDEMIC
  2. SUPERVISED MACHINE LEARNING APROACHES FOR SENTIMENT ANALYSIS ON A MOVIE REVIEW
  3. CLOUD COMPUTING LOAD BALANCING: RETROSPECTS AND CHALLENGES
  4. FRIEND RECOMMENDER SYSTEM BASED ON PERSONALITY TRAITS USING REGRESSION TREE ALGORITHM
  5. A SYSTEMATIC REVIEW ON TECHNIQUES FOR CREDIT CARD FRAUD DETECTION
  6. SECURE DECENTRALIZED HEALTH RECORD STORAGE AND SHARING SYSTEM BASED ON BLOCKCHAIN AND IPFS

2019 Conference Paper Title

  1. Big Data And Big Data Analytics: A Literature-Based Research On Privacy And Security – A Decade Tour 
  1. Development of a Framework for the Determination of an Asset as Critical National Information Infrastructure (CNII)
  1. Electronic Voting: a Framework for a Secure Biometric-Based System 
  1. Towards Hybridization Of Genetic Algorithm (Ga) And Artificial Neural Network (Ann) For The Detection Of Advanced Persistent Threats (APT) 
  1. A Digital Forensics Investigation Model that Incorporates Digital Chain of Custody for its Integrity, and Authenticity 
  1. Design and Implementation of an Internet-Driven Indoor Fire Alarm System using Internet of Things Circuitry (Arduino) 
  1. A Framework for Performance Evaluation of Email Spam Detection 
  1. Email Urgency Classifier Using Natural Language Processing and Naïve Bayes 
  1. Securing the Chain Of Drug Distribution Analysis Using The Blockchain Technology 
  1. On Quantum Cryptography for Network Security 
  1. A Convolutional Neural Network Library
  2. Issues And Challenges Using Wi-Fi In Internet Of Things (IoT) Smart City

2018 Conference Paper Title

  1. A Deep Learning Model for Predicting Multistage Cyberattacks
  2. Real-Time Mobile Health System for Remote Consultations
  3. Deep Neural Network-Based Learning Analytics in Medical Education for Enhanced Universal Health Coverage
  4. Dual Biometrics And Elliptic Curve Cryptography Based E-Commerce Security
  5. Implementation of Modified Pull-All Data Migration for a Java-based Mobile Agent Using Coloured Petri Net (CPN)
  6. Detection of a Real-time Cyber-attack using Locator Agent Algorithm
  7. Performance Analysis-Based Parameter Tuning Of Clonal Selection Algorithm For Anomaly Detection
  8. Digital Security Considerations For Development: Wearables Personal Emergency Response Systems (WPERS) For Safety, Security, and Health
  9. Normative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network
  10. Design and Implementation of a Knowledge-Based Authentication System
  11. Web-based Employee Management System for Nigerian Institute of Medical Research
  12. Password Authentication and Staff Awareness Training: Towards Security of Enterprise Users
  13. Survey of Intellectual Capital Models, Strengths and Weaknesses