Gladys A. Arome

Learn More
The ever-growing use of the Internet comes with a surging escalation of communication and data access. Most existing intrusion detection systems have assumed the one-size-fits-all solution model. Such IDS is not as economically sustainable for all organizations. Furthermore, studies have found that Recurrent Neural Network out-performs Feed-forward Neural(More)
The ever-growing use of the Internet comes with a surging escalation of communication and data access. Most existing intrusion detection systems have assumed the one-size-fits-all solution model. Such IDS is not as economically sustainable for all organizations. Furthermore, studies have found that Recurrent Neural Network out-performs Feed-forward Neural(More)
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity as to personal, source and destination location and content information. Notably, no network capability is in existence to completely negate anonymity leakage in network latency, thus,(More)
v Abstract As an online institution of higher education, Excelsior College strives to ensure delivery of high quality online courses leading to student success. A key benchmark for student success is student-faculty interaction (SFI). The decade-old National Survey of Student Engagement (NSSE) measures several benchmarks including student-faculty(More)
In this paper, the researchers describe the results obtained after assessing the software process activities in five small to medium sized Indian software companies. This work demonstrates a cost effective framework for software process appraisal, specifically targeted at Indian software Small-to-Medium-sized Enterprises (SMEs). The framework explicitly(More)
  • 1