Skip to main content

Research Repository

Advanced Search

All Outputs (4)

Passwordless authentication using a combination of cryptography, steganography, and biometrics (2024)
Journal Article
Oduguwa, T., & Arabo, A. (2024). Passwordless authentication using a combination of cryptography, steganography, and biometrics. Journal of Cybersecurity and Privacy, 4(2), 278-297. https://doi.org/10.3390/jcp4020014

User-generated passwords often pose a security risk in authentication systems. However, providing a comparative substitute poses a challenge, given the common tradeoff between security and user experience. This paper integrates cryptographic methods... Read More about Passwordless authentication using a combination of cryptography, steganography, and biometrics.

COVID-19 Pandemic cybersecurity Issues (2020)
Journal Article
Pranggono, B., & Arabo, A. (2021). COVID-19 Pandemic cybersecurity Issues. Internet Technology Letters, 4(2), Article e247. https://doi.org/10.1002/itl2.247

This paper studies the cybersecurity issues that have occurred during the coronavirus (COVID-19) pandemic. During the pandemic, cyber criminals and Advanced Persistent Threat (APT) groups have taken advantage of targeting vulnerable people and system... Read More about COVID-19 Pandemic cybersecurity Issues.

Detecting ransomware using process behavior analysis (2020)
Journal Article
Arabo, A., Dijoux, R., Poulain, T., & Chevalier, G. (2020). Detecting ransomware using process behavior analysis. Procedia Computer Science, 168, 289-296. https://doi.org/10.1016/j.procs.2020.02.249

Ransomware attacks are one of the biggest and attractive threats in cyber security today. Anti-virus software's are often inefficient against zero-day malware and ransomware attacks, important network infections could result in a large amount of data... Read More about Detecting ransomware using process behavior analysis.

MIAEC: Missing data imputation based on the evidence Chain (2018)
Journal Article
Xu, X., Chong, W., Li, S., & Arabo, A. (2018). MIAEC: Missing data imputation based on the evidence Chain. IEEE Access, 6, 12983-12992. https://doi.org/10.1109/ACCESS.2018.2803755

© 2013 IEEE. Missing or incorrect data caused by improper operations can seriously compromise security investigation. Missing data can not only damage the integrity of the information but also lead to the deviation of the data mining and analysis. Th... Read More about MIAEC: Missing data imputation based on the evidence Chain.