Richard Adeyemi Ikuesan

Orcid: 0000-0001-7355-2314

Affiliations:
  • Federal University of Technology Minna, Nigeria


According to our database1, Richard Adeyemi Ikuesan authored at least 39 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Infeasibility of Sequitur-Based Motif for Mouse Dynamics in Digital Forensics.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

Smartphone Forensics: A Comparative Study of Common Mobile Phone Models.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

Forensic Investigation of Humanoid Social Robot: A Case Study on Zenbo Robot.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
MalFe - Malware Feature Engineering Generation Platform.
Comput., September, 2023

Offline Handwritten Chinese Character Using Convolutional Neural Network: State-of-the-Art Methods.
J. Adv. Comput. Intell. Intell. Informatics, July, 2023

Towards an Open-Source Based E-Mail Forensic Tool that uses Headers in Digital Investigation.
Proceedings of the 6th International Conference on Networking, 2023

2022
Cyber Security Threat Awareness Framework for High School Students in Qatar.
CoRR, 2022

Ransomware Detection using Process Memory.
CoRR, 2022

Cyberbullying Indicator as a Precursor to a Cyber Construct Development.
CoRR, 2022

Secure Storage Model for Digital Forensic Readiness.
IEEE Access, 2022

Understanding Issues and Challenges of DFR Implementation in SDN Platform.
Proceedings of the CENTERIS 2022 - International Conference on ENTERprise Information Systems / ProjMAN - International Conference on Project MANagement / HCist, 2022

The Effect of Deep Learning Methods on Deepfake Audio Detection for Digital Investigation.
Proceedings of the CENTERIS 2022 - International Conference on ENTERprise Information Systems / ProjMAN - International Conference on Project MANagement / HCist, 2022

2021
A Blockchain-Based Multi-Factor Authentication Model for a Cloud-Enabled Internet of Vehicles.
Sensors, 2021

Digital forensic readiness in operational cloud leveraging ISO/IEC 27043 guidelines on security monitoring.
Secur. Priv., 2021

Digital Forensics Subdomains: The State of the Art and Future Directions.
IEEE Access, 2021

Towards a Learning-enabled Virtual Sensor Forensic Architecture Compliant with Edge Intelligence.
Proceedings of the Second International Conference on Intelligent Data Science Technologies and Applications, 2021

A Digital Forensic Readiness Cybercrime Semantic Trigger Process.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2021

2020
Real-time monitoring as a supplementary security component of vigilantism in modern network environments.
CoRR, 2020

Detecting Centralized Architecture-Based Botnets using Travelling Salesperson Non-Deterministic Polynomial-Hard problem, TSP-NP Technique.
CoRR, 2020

Towards the Development of an Integrated Incident Response Model for Database Forensic Investigation Field.
IEEE Access, 2020

A Review of Mobile Forensic Investigation Process Models.
IEEE Access, 2020

Categorization and Organization of Database Forensic Investigation Processes.
IEEE Access, 2020

Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud.
Proceedings of the NISS 2020: The 3rd International Conference on Networking, Information Systems & Security, Marrakech, Morocco, March 31, 2020

Practical Approach to Urban Crime Prevention in Developing Nations.
Proceedings of the NISS 2020: The 3rd International Conference on Networking, Information Systems & Security, Marrakech, Morocco, March 31, 2020

Proactive Forensics: Keystroke Logging from the Cloud as Potential Digital Evidence for Forensic Readiness Purposes.
Proceedings of the IEEE International Conference on Informatics, 2020

2019
Polychronicity tendency-based online behavioral signature.
Int. J. Mach. Learn. Cybern., 2019

Digital behavioral-fingerprint for user attribution in digital forensics: Are we there yet?
Digit. Investig., 2019

Generic 5G Infrastructure for IoT Ecosystem.
Proceedings of the Emerging Trends in Intelligent Computing and Informatics, 2019

2018
Digital Forensic Readiness Framework for Ransomware Investigation.
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018

2017
A Conceptual Model for Holistic Classification of Insider.
CoRR, 2017

A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

High-level online user attribution model based on human Polychronic-Monochronic tendency.
Proceedings of the 2017 IEEE International Conference on Big Data and Smart Computing, 2017

Aesthetic surgery induced transformation face insensitive features: The medical and theoretical standpoint.
Proceedings of the IEEE AFRICON 2017, Cape Town, South Africa, September 18-20, 2017, 2017

2016
Understanding Online Behavior: Exploring the Probability of Online Personality Trait Using Supervised Machine-Learning Approach.
Frontiers ICT, 2016

2014
A psychographic framework for online user identification.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

2013
A Review of Current Research in Network Forensic Analysis.
Int. J. Digit. Crime Forensics, 2013

2012
Bio-Thentic Card: Authentication concept for RFID Card
CoRR, 2012

Users Authentication and Privacy control of RFID Card
CoRR, 2012

Identifying critical features for network forensics investigation perspectives
CoRR, 2012


  Loading...