Boniface K. Alese

Orcid: 0000-0002-5709-1017

Affiliations:
  • Federal University of Technology, Akure, Nigeria


According to our database1, Boniface K. Alese authored at least 30 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Friendly Folk Advice: Exploring Cybersecurity Information Sharing in Nigeria.
Proceedings of the Human-Computer Interaction - INTERACT 2023 - 19th IFIP TC13 International Conference, York, UK, August 28, 2023

2022
Post-quantum cryptography-driven security framework for cloud computing.
Open Comput. Sci., 2022

2021
Automatic license plate recognition on microprocessors and custom computing platforms: A review.
IET Image Process., 2021

Optimised Privacy Model for Cloud Data.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

2020
A Secured System for Internet Enabled Host Devices.
Netw. Commun. Technol., 2020

Modelling Malicious Attack in Social Networks.
Netw. Commun. Technol., 2020

Evaluation of Selected Stacked Ensemble Models for the Optimal Multi-class Cyber-Attacks Detection.
Int. J. Cyber Situational Aware., 2020

Automatic Vowel Elision Resolution in Yorùbá Language.
Proceedings of the SAICSIT '20: Conference of the South African Institute of Computer Scientists and Information Technologists 2020, 2020

A Multi-layer Stack Ensemble Approach to Improve Intrusion Detection System's Prediction Accuracy.
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020

Graphical analysis of captured network packets for detection of suspicious network nodes.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020

2019
Post-Quantum Crystography System for Secure Electronic Voting.
Open Comput. Sci., 2019

2017
Epidemic Response Model for Malware Defense on Computer Networks.
Int. J. Cyber Situational Aware., 2017

A location privacy system in mobile network using game theory.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

A graphic-based cryptographic model for authentication.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

Design of a Secure Public Accounts System for Enhanced War Against Corruption Using Intelligent Software Agent.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2017

2015
A Fine-Grained Data Access Control System in Wireless Sensor Network.
Acta Informatica Pragensia, 2015

Risk analysis in cyber situation awareness using Bayesian approach.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

Development of cyber situation awareness model.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

2014
Barefoot morphology: A person unique feature for forensic identification.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

An Attribute-Based Signature using rivest shamir adleman scheme.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Multi-level access priority channel allocation strategies in Global System for Mobile communications (GSM) networks.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

A replication model for students' result processing.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

A robust multicast authentication scheme based on asymmetric key signature.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Evaluation of information security risks using hybrid assessment model.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Improving deception in honeynet: Through data manipulation.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

2013
DGM approach to network attacker and defender strategies.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Post-Quantum Crystography: A combination of Post-Quantum Cryptography and Steganography.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

A prosodic Text-to-Speech system for Yorùbá language.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Edge detection methods in palm-print identification.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2010
A Bio-Inspired Concept for Information Security Modelling.
Int. J. Green Comput., 2010


  Loading...