<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>DSpace Collection: Cyber Security Science</title>
  <link rel="alternate" href="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/53" />
  <subtitle>Cyber Security Science</subtitle>
  <id>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/53</id>
  <updated>2026-05-02T14:36:27Z</updated>
  <dc:date>2026-05-02T14:36:27Z</dc:date>
  <entry>
    <title>Layered and hierarchical approach for modelling multidimensional design threats</title>
    <link rel="alternate" href="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30066" />
    <author>
      <name>Ojeniyi, Joseph Adebayo</name>
    </author>
    <author>
      <name>Waziri, Victor Onomza</name>
    </author>
    <author>
      <name>Aibinu, Abiodun Musa</name>
    </author>
    <author>
      <name>Inyiama, H. C.</name>
    </author>
    <id>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30066</id>
    <updated>2025-07-31T07:51:58Z</updated>
    <published>2016-01-01T00:00:00Z</published>
    <summary type="text">Title: Layered and hierarchical approach for modelling multidimensional design threats
Authors: Ojeniyi, Joseph Adebayo; Waziri, Victor Onomza; Aibinu, Abiodun Musa; Inyiama, H. C.
Abstract: Security of any digitally designed system is not guaranteed until an appropriate modelling and assessemtn of threat is carried out and proper mitigation is iteratively done.</summary>
    <dc:date>2016-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Improving Digital Forensics Analysis in Federated Domains through Estimator Analysis and Network Flow Optimization</title>
    <link rel="alternate" href="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30065" />
    <author>
      <name>Ojeniyi, Joseph Adebayo</name>
    </author>
    <author>
      <name>Longe, O. B.</name>
    </author>
    <author>
      <name>Oguntade, E. S.</name>
    </author>
    <id>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30065</id>
    <updated>2025-07-31T07:39:01Z</updated>
    <published>2016-01-01T00:00:00Z</published>
    <summary type="text">Title: Improving Digital Forensics Analysis in Federated Domains through Estimator Analysis and Network Flow Optimization
Authors: Ojeniyi, Joseph Adebayo; Longe, O. B.; Oguntade, E. S.
Abstract: Digital Forensics is a field that deals with safe and unaltered collection of vital data from the scene of crime &#xD;
incidence for the purpose of investigation and prosecution. Different tools have been developed to help in &#xD;
analysing or estimating the degree or extent of the criminality. However, the exponential growth and &#xD;
expansion being experienced in field of computing and networking is making these estimations or forensic &#xD;
analysis more or less accurate. Some of the reasons militating against effective analysis are attributed to &#xD;
various inhibiting policies across different platforms, routers, domains of networking. In this paper, some &#xD;
tools used for forensics analysis or estimating the probative values of digital evidence are referred to &#xD;
estimators. Three of these estimators are selected and tested in a simulated environment. Analysis of &#xD;
three digital forensics estimators (EnCase, Safeback and TootKit) is carried out in this paper. This is &#xD;
experimentally aided by simulation of heterogeneous domain-based network and packet analyzer is used &#xD;
to collect probability reading in the packet option field at each hop along the communication path between &#xD;
an attacker and the victim. The graphical analysis with varied initial values shows that estimation &#xD;
accuracies of the estimators reduce irrespective of initial values. With the developed model, the router &#xD;
could be configured for packet boosting at the point of dwindling probabilities using Maximum Network &#xD;
Flow Algorithm</summary>
    <dc:date>2016-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Enhanced Security Testbed Threat Model Based on Parametric Equation and Multi-Level Design Approach</title>
    <link rel="alternate" href="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30064" />
    <author>
      <name>Ojeniyi, Joseph Adebayo</name>
    </author>
    <author>
      <name>Waziri, Victor Onomza</name>
    </author>
    <author>
      <name>Aibinu, Abiodun Musa</name>
    </author>
    <author>
      <name>Inyiama, H. C.</name>
    </author>
    <id>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30064</id>
    <updated>2025-07-31T07:22:28Z</updated>
    <published>2016-01-01T00:00:00Z</published>
    <summary type="text">Title: Enhanced Security Testbed Threat Model Based on Parametric Equation and Multi-Level Design Approach
Authors: Ojeniyi, Joseph Adebayo; Waziri, Victor Onomza; Aibinu, Abiodun Musa; Inyiama, H. C.
Abstract: The threat model of a security testbed provides quantitative and qualitative conceptual insights into &#xD;
robustness of the developed testbed. Security of any digitally designed system is not guaranteed until an &#xD;
appropriate modelling and assessment of threat is carried out and proper mitigation is iteratively done. &#xD;
Several existing techniques could not handle the complexities, multi-dimensionality and layered nature &#xD;
inherent in threat modelling of multi-layered systems. Most approaches focus on a single level of data &#xD;
communication. This article aims to develop a threat model that considers different levels and dimensions &#xD;
of data communications over a network architecture. Parametric-based equation and data flow diagrams &#xD;
were used in the modelling. The model was iteratively assessed and evaluated to ensure conformity with &#xD;
pre-defined security requirement for the testbed.</summary>
    <dc:date>2016-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Development of a hybridized CNN-BiGRU Framework for detection of website phishing attacks</title>
    <link rel="alternate" href="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30063" />
    <author>
      <name>Egigogo, A. R.</name>
    </author>
    <author>
      <name>Ismaila, Idris</name>
    </author>
    <author>
      <name>Olalere, Morufu</name>
    </author>
    <author>
      <name>Abisoye, O. A.</name>
    </author>
    <author>
      <name>Ojeniyi, Joseph Adebayo</name>
    </author>
    <id>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30063</id>
    <updated>2025-07-31T06:59:12Z</updated>
    <published>2025-01-01T00:00:00Z</published>
    <summary type="text">Title: Development of a hybridized CNN-BiGRU Framework for detection of website phishing attacks
Authors: Egigogo, A. R.; Ismaila, Idris; Olalere, Morufu; Abisoye, O. A.; Ojeniyi, Joseph Adebayo
Abstract: Phishing remains a major cybersecurity challenge, with &#xD;
attackers using deceptive tactics to trick users into disclosing &#xD;
confidential data. Traditional detection systems, which often rely &#xD;
on fixed features or predefined rules, struggle to keep up with &#xD;
rapidly evolving phishing strategies. This research introduces a &#xD;
deep learning-based solution that combines Convolutional &#xD;
Neural Networks (CNN) and Bidirectional Gated Recurrent &#xD;
Units (BiGRU) to improve phishing website detection. The CNN &#xD;
component is responsible for learning spatial patterns from web &#xD;
data, while the BiGRU layer captures sequential relationships, &#xD;
providing a more complete understanding of the underlying &#xD;
threats. The framework involves meticulous preprocessing steps &#xD;
such as data cleaning, normalization through MinMax scaling, &#xD;
and optimal feature selection using the SelectKBest, CNN and &#xD;
BiGRU methods. The model was trained and tested on large&#xD;
scale, publicly available datasets from IEEE Data Port and &#xD;
Mendeley, consisting of over 250,000 URL entries. Through &#xD;
train-test split and cross-validation techniques, the model &#xD;
consistently achieved outstanding results: 99.96% accuracy, &#xD;
99.92% precision, 100% recall, and a 99.92% F1 score. When &#xD;
compared to existing solutions, this hybrid approach sets a new &#xD;
performance benchmark, underscoring the power of combining &#xD;
spatial and temporal deep learning methods in defending against &#xD;
phishing threats.</summary>
    <dc:date>2025-01-01T00:00:00Z</dc:date>
  </entry>
</feed>

