Cybersecurity
Tech-Sphere Journal for Pure and Applied Sciences
Tech-Sphere Journal for Pure and Applied Sciences
Home
Current
Archives
Editorial Committee
Editorial Team
Editorial Responsibilities
Reviewers Responsibilities
Visit Our Journals
Back to Landing Page
TSJERI - Engineering Journal
TSJBMS - Journal of Business, Finance and Humanities
TSJEES - Journal of Environmental and Earth Sciences
TSJARI - Agricultural Sciences Journal
Resources
Citation Guidelines
About
About the Journal
Aim and Scope
Abstracting and Indexing
Criteria of Publication
Authors Guidelines
Open Access Policy
Licence and Copyright
Publication Ethics
Submissions
Privacy Statement
Contact
Register
Login
Register
Login
Cybersecurity
10 Items
All Items
Odeh Christopher, Azaka Maduabuchukwu
57-68
A Data-Driven Decade Review of Ransomware Evolution and Defensive Countermeasures
https://doi.org/10.5281/zenodo.17473811
PDF
DOI:
https://doi.org/10.5281/zenodo.17473811
Obaze Caleb Akachukwu, Onwuegbuzie Innocent U., Onwujei Augustine Ikechukwu
42-56
Adaptive Intelligence for Zero Trust (AIZT): An AI-driven Conceptual Framework for Proactive Cloud Cybersecurity Infrastructure
https://doi.org/10.5281/zenodo.17246012
PDF
DOI:
https://doi.org/10.5281/zenodo.17246012
Akinsiku Ayokunle Michael, Akin-Olayemi Titilope Helen, Idris-Tajudeen Rashidat
AI-Driven Security Frameworks for IoT Devices in 5G Edge Environments: A Survey
https://doi.org/10.5281/zenodo.16972423
PDF
DOI:
https://doi.org/10.5281/zenodo.16972423
Alabi Oyegbola Augustine, Olatunji-Ishola Comfort Oyekemi, Okanlawon Kayode
1-12
Blockchain Applications for Dependable and Secure Data Management: A Review
https://doi.org/10.5281/zenodo.16944634
PDF
DOI:
https://doi.org/10.5281/zenodo.16944634
A. G. Ola, O.D. Alowolodu, A.H. Afolayan
Deep Learning-Based Network Intrusion Detection Using CNN and Enhanced UNSW-NB15 Multi-Class Dataset
https://doi.org/10.5281/zenodo.15495192
PDF
DOI:
https://doi.org/10.5281/zenodo.15495192
ARAOYE Olalekan Ismaila, ONI Babatunde Joseph, OJO Oluwafemi
1-13
Development of Anti-Impersonation System (AIS) for Higher Institutions of Learning: A Case Study of the Federal Polytechnic Ado-Ekiti, Nigeria
PDF
Fele Taiwo, Akinwamide Sunday Oluwafemi, Ojo Olufemi Ariyo
1-17
Evaluation of Supervised Machine Learning Models with Recursive Feature Elimination for Network Traffic Attack Classification
https://doi.org/10.5281/zenodo.17072955
PDF
DOI:
https://doi.org/10.5281/zenodo.17072955
Akinsiku Ayokunle Michael
69-83
Federated Learning Techniques for Privacy-Preserving AI in Distributed Networks: A Review
https://doi.org/10.5281/zenodo.17496759
PDF
DOI:
https://doi.org/10.5281/zenodo.17496759
Akin-Olayemi Titilope Helen, Idris-Tajudeen Rashidat
From the Ground Up: Leveraging AI to Transform Education at the School Level in Nigeria
https://doi.org/10.5281/zenodo.15162499
PDF
DOI:
https://doi.org/10.5281/zenodo.15162499
Olatunji-Ishola, Comfort Oyekemi, Okanlawon Kayode
The Risks and Rewards of AI Dependence in Nigerian Education: A Critical Evaluation
https://doi.org/10.5281/zenodo.15161212
PDF
DOI:
https://doi.org/10.5281/zenodo.15161212
×
Username
*
Required
Password
*
Required
Forgot your password?
Keep me logged in
Login
No account?
Register here