2021 Conference Paper Title
- TECHNOLOGY PERSPECTIVE OF BEHAVIORAL ATTRIBUTES ON E-COMMERCE SITES DURING PANDEMIC
- SUPERVISED MACHINE LEARNING APROACHES FOR SENTIMENT ANALYSIS ON A MOVIE REVIEW
- CLOUD COMPUTING LOAD BALANCING: RETROSPECTS AND CHALLENGES
- FRIEND RECOMMENDER SYSTEM BASED ON PERSONALITY TRAITS USING REGRESSION TREE ALGORITHM
- A SYSTEMATIC REVIEW ON TECHNIQUES FOR CREDIT CARD FRAUD DETECTION
- SECURE DECENTRALIZED HEALTH RECORD STORAGE AND SHARING SYSTEM BASED ON BLOCKCHAIN AND IPFS
2019 Conference Paper Title
- Big Data And Big Data Analytics: A Literature-Based Research On Privacy And Security – A Decade Tour
- Development of a Framework for the Determination of an Asset as Critical National Information Infrastructure (CNII)
- Electronic Voting: a Framework for a Secure Biometric-Based System
- Towards Hybridization Of Genetic Algorithm (Ga) And Artificial Neural Network (Ann) For The Detection Of Advanced Persistent Threats (APT)
- A Digital Forensics Investigation Model that Incorporates Digital Chain of Custody for its Integrity, and Authenticity
- Design and Implementation of an Internet-Driven Indoor Fire Alarm System using Internet of Things Circuitry (Arduino)
- A Framework for Performance Evaluation of Email Spam Detection
- Email Urgency Classifier Using Natural Language Processing and Naïve Bayes
- Securing the Chain Of Drug Distribution Analysis Using The Blockchain Technology
- On Quantum Cryptography for Network Security
- A Convolutional Neural Network Library
- Issues And Challenges Using Wi-Fi In Internet Of Things (IoT) Smart City
2018 Conference Paper Title
- A Deep Learning Model for Predicting Multistage Cyberattacks
- Real-Time Mobile Health System for Remote Consultations
- Deep Neural Network-Based Learning Analytics in Medical Education for Enhanced Universal Health Coverage
- Dual Biometrics And Elliptic Curve Cryptography Based E-Commerce Security
- Implementation of Modified Pull-All Data Migration for a Java-based Mobile Agent Using Coloured Petri Net (CPN)
- Detection of a Real-time Cyber-attack using Locator Agent Algorithm
- Performance Analysis-Based Parameter Tuning Of Clonal Selection Algorithm For Anomaly Detection
- Digital Security Considerations For Development: Wearables Personal Emergency Response Systems (WPERS) For Safety, Security, and Health
- Normative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network
- Design and Implementation of a Knowledge-Based Authentication System
- Web-based Employee Management System for Nigerian Institute of Medical Research
- Password Authentication and Staff Awareness Training: Towards Security of Enterprise Users
- Survey of Intellectual Capital Models, Strengths and Weaknesses