<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/53">
    <title>DSpace Collection: Cyber Security Science</title>
    <link>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/53</link>
    <description>Cyber Security Science</description>
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30066" />
        <rdf:li rdf:resource="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30065" />
        <rdf:li rdf:resource="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30064" />
        <rdf:li rdf:resource="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30063" />
      </rdf:Seq>
    </items>
    <dc:date>2026-05-02T14:36:27Z</dc:date>
  </channel>
  <item rdf:about="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30066">
    <title>Layered and hierarchical approach for modelling multidimensional design threats</title>
    <link>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30066</link>
    <description>Title: Layered and hierarchical approach for modelling multidimensional design threats
Authors: Ojeniyi, Joseph Adebayo; Waziri, Victor Onomza; Aibinu, Abiodun Musa; Inyiama, H. C.
Abstract: Security of any digitally designed system is not guaranteed until an appropriate modelling and assessemtn of threat is carried out and proper mitigation is iteratively done.</description>
    <dc:date>2016-01-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30065">
    <title>Improving Digital Forensics Analysis in Federated Domains through Estimator Analysis and Network Flow Optimization</title>
    <link>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30065</link>
    <description>Title: Improving Digital Forensics Analysis in Federated Domains through Estimator Analysis and Network Flow Optimization
Authors: Ojeniyi, Joseph Adebayo; Longe, O. B.; Oguntade, E. S.
Abstract: Digital Forensics is a field that deals with safe and unaltered collection of vital data from the scene of crime &#xD;
incidence for the purpose of investigation and prosecution. Different tools have been developed to help in &#xD;
analysing or estimating the degree or extent of the criminality. However, the exponential growth and &#xD;
expansion being experienced in field of computing and networking is making these estimations or forensic &#xD;
analysis more or less accurate. Some of the reasons militating against effective analysis are attributed to &#xD;
various inhibiting policies across different platforms, routers, domains of networking. In this paper, some &#xD;
tools used for forensics analysis or estimating the probative values of digital evidence are referred to &#xD;
estimators. Three of these estimators are selected and tested in a simulated environment. Analysis of &#xD;
three digital forensics estimators (EnCase, Safeback and TootKit) is carried out in this paper. This is &#xD;
experimentally aided by simulation of heterogeneous domain-based network and packet analyzer is used &#xD;
to collect probability reading in the packet option field at each hop along the communication path between &#xD;
an attacker and the victim. The graphical analysis with varied initial values shows that estimation &#xD;
accuracies of the estimators reduce irrespective of initial values. With the developed model, the router &#xD;
could be configured for packet boosting at the point of dwindling probabilities using Maximum Network &#xD;
Flow Algorithm</description>
    <dc:date>2016-01-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30064">
    <title>Enhanced Security Testbed Threat Model Based on Parametric Equation and Multi-Level Design Approach</title>
    <link>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30064</link>
    <description>Title: Enhanced Security Testbed Threat Model Based on Parametric Equation and Multi-Level Design Approach
Authors: Ojeniyi, Joseph Adebayo; Waziri, Victor Onomza; Aibinu, Abiodun Musa; Inyiama, H. C.
Abstract: The threat model of a security testbed provides quantitative and qualitative conceptual insights into &#xD;
robustness of the developed testbed. Security of any digitally designed system is not guaranteed until an &#xD;
appropriate modelling and assessment of threat is carried out and proper mitigation is iteratively done. &#xD;
Several existing techniques could not handle the complexities, multi-dimensionality and layered nature &#xD;
inherent in threat modelling of multi-layered systems. Most approaches focus on a single level of data &#xD;
communication. This article aims to develop a threat model that considers different levels and dimensions &#xD;
of data communications over a network architecture. Parametric-based equation and data flow diagrams &#xD;
were used in the modelling. The model was iteratively assessed and evaluated to ensure conformity with &#xD;
pre-defined security requirement for the testbed.</description>
    <dc:date>2016-01-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30063">
    <title>Development of a hybridized CNN-BiGRU Framework for detection of website phishing attacks</title>
    <link>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30063</link>
    <description>Title: Development of a hybridized CNN-BiGRU Framework for detection of website phishing attacks
Authors: Egigogo, A. R.; Ismaila, Idris; Olalere, Morufu; Abisoye, O. A.; Ojeniyi, Joseph Adebayo
Abstract: Phishing remains a major cybersecurity challenge, with &#xD;
attackers using deceptive tactics to trick users into disclosing &#xD;
confidential data. Traditional detection systems, which often rely &#xD;
on fixed features or predefined rules, struggle to keep up with &#xD;
rapidly evolving phishing strategies. This research introduces a &#xD;
deep learning-based solution that combines Convolutional &#xD;
Neural Networks (CNN) and Bidirectional Gated Recurrent &#xD;
Units (BiGRU) to improve phishing website detection. The CNN &#xD;
component is responsible for learning spatial patterns from web &#xD;
data, while the BiGRU layer captures sequential relationships, &#xD;
providing a more complete understanding of the underlying &#xD;
threats. The framework involves meticulous preprocessing steps &#xD;
such as data cleaning, normalization through MinMax scaling, &#xD;
and optimal feature selection using the SelectKBest, CNN and &#xD;
BiGRU methods. The model was trained and tested on large&#xD;
scale, publicly available datasets from IEEE Data Port and &#xD;
Mendeley, consisting of over 250,000 URL entries. Through &#xD;
train-test split and cross-validation techniques, the model &#xD;
consistently achieved outstanding results: 99.96% accuracy, &#xD;
99.92% precision, 100% recall, and a 99.92% F1 score. When &#xD;
compared to existing solutions, this hybrid approach sets a new &#xD;
performance benchmark, underscoring the power of combining &#xD;
spatial and temporal deep learning methods in defending against &#xD;
phishing threats.</description>
    <dc:date>2025-01-01T00:00:00Z</dc:date>
  </item>
</rdf:RDF>

