[PDF][PDF] Experimental analysis of intrusion detection systems using machine learning algorithms and artificial neural networks

A Abdulkareem, TE Somefun, AL Mutalub… - International Journal of …, 2024 - academia.edu
Since the invention of the internet for military and academic research purposes, it has
evolved to meet the demands of the increasing number of users on the network, who have …

[PDF][PDF] Structuring challenges in requirement engineering techniques

OJ Okesola, K Okokpuji, PRO Oyom… - Proceedings of the …, 2018 - academia.edu
Experts in the field of requirement engineering have called for advancement in requirement
structuring techniques as majority of the techniques are inadequate and give inconsistent …

On Information Technology Disaster Recovery and Its Relevance to Business Continuity

CG Kennedy, K Okokpujie, E Noma-Osaghae… - … conference on smart …, 2021 - Springer
A technology disaster can result in a long-term interruption, a loss of reputation, monetary
losses, and the incapacity to continue doing business. Although there is much information …

On Information Technology Disaster Recovery and Its Relevance to Business Continuity

KS Bhandari, JM Kalibbala - Proceedings of 2nd International …, 2022 - books.google.com
It is the twenty-first century, and computerized data is all the new rave. There is no existing
establishment, business, enterprise, or organization without a computer system containing …

[PDF][PDF] A Subtle Serial Key based Software Protection Scheme

AI Adekitan, A Orimogunje - Journal of Engineering Science and …, 2018 - academia.edu
Software piracy is a modern day war between malicious software pirates and software
developers. Annually, developers lose billions of dollars in revenue to piracy, making it an …

[引用][C] A Case of Internet Insecurity on SMEs in Nigeria: A Cybercafé Entrepreneur Experience

S Ojo - 2021 - SAGE Publications: SAGE Business …