Skip to main content

Showing 1–4 of 4 results for author: Adeyemi, I R

Searching in archive cs. Search in all archives.
.
  1. A Conceptual Model for Holistic Classification of Insider

    Authors: Ikuesan Richard Adeyemi, Shukor Abd Razak, Mazleena Salleh

    Abstract: The process through which an insider to an organization can be described or classified is lined within the orthodox paradigm of classification in which an organization considers only subject with requisite employee criterion as an insider to that organization. This is further clouded with the relative rigidity in operational security policies being implemented in organizations. Establishing invest… ▽ More

    Submitted 16 June, 2017; originally announced June 2017.

    Journal ref: Asian J. Applied Sci., 7: 343-359 (2014)

  2. arXiv:1210.5913  [pdf

    cs.CR

    Bio-Thentic Card: Authentication concept for RFID Card

    Authors: Ikuesan R. Adeyemi, Norafida Bt Ithnin

    Abstract: Radio frequency identification (RFID) is a technology that employs basic identifier of an object embedded in a chip, transmitted via radio wave, for identification. An RFID Card responds to query or interrogation irrespective of "Who" holds the Card; like a key to a door. Since an attacker can possess the card, access to such object can therefore be easily compromised. This security breach is clas… ▽ More

    Submitted 5 October, 2012; originally announced October 2012.

    Comments: (IJCSIS) International Journal of Computer Science and Information Security 2012

  3. arXiv:1210.1647  [pdf

    cs.CR

    Users Authentication and Privacy control of RFID Card

    Authors: Ikuesan R. Adeyemi, Norafida Bt. Ithnin

    Abstract: Security and Privacy concerns in Radio frequency identification (RFID) technology particularly RFID Card, is a wide research area which have attracted researchers for over a decade. Authenticating users at the Card end of the RFID technology constitutes one of the major sources of attacks on the system. In this research, we studied the various known attacks and mitigation available. We proposed a… ▽ More

    Submitted 5 October, 2012; originally announced October 2012.

    Comments: International Journal of Scientific & Engineering Research (IJSER) ISSN 2229-5518 2012

  4. arXiv:1210.1645  [pdf

    cs.CR cs.CY

    Identifying critical features for network forensics investigation perspectives

    Authors: Ikuesan R. Adeyemi, Shukor Abd Razak, Nor Amira Nor Azhan

    Abstract: Research in the field of network forensics is gradually expanding with the propensity to fully accommodate the tenacity to help in adjudicating, curbing and apprehending the exponential growth of cyber crimes. However, investigating cyber crime differs, depending on the perspective of investigation. There is therefore the need for a comprehensive model, containing relevant critical features requir… ▽ More

    Submitted 5 October, 2012; originally announced October 2012.

    Comments: International Journal of Computer Science and Information Security