Charles A. Shoniregun

Learn More
The Internet worm infects the computer system, network packet, communication performance, and the traditional method of managing network using SNMP to monitor abnormal network traffic. To monitor suspicious Internet activity and to recognise the Internet worm categories, we proposed FloWorM system that can reduce the misjudgment and detection rate based on(More)
Trust problems in virtual learning environments are the main problems why virtual learning environments providers do not have enough number of students to participate in these environments. This study proposed a framework to explain the factors that constitute students trust in virtual learning environments across different cultures. The variables that(More)
This paper focuses on the security of Internet access over the third generation mobile telecommunication networks. We explore the characteristics of cryptographic attacks and the similarities between the exposures of different secret keys in cryptographic attacks and propose three measures that limit the exposure of the sensible secret key. These measures(More)
Universal Mobile Telecommunications System is the third generation mobile communications system. It was built on the concepts of GSM and is the starting point in the development of the fourth generation network. This paper proposes enhancements for the initial identification and for the Authentication and Key Agreement (AKA) protocols that solve two known(More)
The ubiquitous nature of e-Learning applications in dealing with huge and diverse population of users creates the gap for errors and malicious attacks. The ability to quickly estimate security risks is particularly crucial for automated assessment of e-learning. What type of measures is taken to keep the privacy and integrity of the information stored? And(More)
The service oriented architecture (SOA) provides a methodology for designing software systems by integrating loosely coupled services. Compared to traditional distributed object-oriented architectures, SOA is more suitable to integrate heterogeneous systems, and more adaptable in a changing environment. This paper presents the design and implementation of a(More)
This paper presents machine learning anti-phishing technique (MLAPT) - a machine learning framework that applies knowledge intensive approach to detect and prevent phishing attacks on email systems. Preventions, detections and a higher level of prevention measure can be guaranteed. The system is evaluated against a database of human-judged phishing(More)
The inherent characteristics of Web-based communication could be used to extend the "gallery metaphor", of lack of discrete boundaries, idiosyncrasies of transmission of information and an interface-driven environment. Part of the attraction for placing art on the Web related to the scope for interaction and feedback from a viewer base that would not(More)