Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS

Linked e-resources

Details

Intro; Foreword; Preface; Acknowledgements; Contents; 1 Introduction; 1.1 Main Contributions; 1.2 Document Structure; 2 Natural Laws (Benford's Law and Zipf's Law) for Network Traffic Analysis; 2.1 Contribution; 2.2 Benford's Law; 2.3 Zipf's Law; 2.4 Network Traffic Analysis and IDS; 2.4.1 Flow-Based IDS; 2.5 Network Flows and TCP Flows; 2.6 Application to Network Traffic Analysis; 2.6.1 Method Description; 2.6.2 The Metrics; 2.6.3 Analysis of Different Flow Ordering Options; 2.7 Experimental Setup and Results; 2.7.1 Datasets Used for Our Experiments; 2.7.2 Flow Size or Flow Size Difference

2.7.3 How to Determine Flow Window Size2.7.4 TCP Flow Ordering; 2.7.5 More Results on Different Datasets; 2.7.6 Zipf's Law for Network Traffic Analysis; 2.7.7 Zipf's Law for Malicious, Non-malicious, Mixture of Malicious and Non-malicious Network Traffic; 2.7.8 Comparative Analysis of Zipf's Law and Benford's Law with Implications; 2.8 Conclusion; References; 3 Combination of Natural Laws (Benford's Law and Zipf's Law) for Fake News Detection; 3.1 Combination of Benford's Law and Zipf's Law for Fake News Detection; 3.2 Results and Discussions; 3.3 Conclusion; References

4 Cybersecurity and Mobile Device Forensic4.1 Nigeria and Internet Fraud; 4.2 Reasons for Increase in Cyber Crimes in Nigeria; 4.3 Types of Cyber Crimes in Nigeria; 4.4 Link Between Mobile Device Forensics and Cybersecurity; 4.5 Cybersecurity Laws and Punishment in Nigeria; 4.6 Conclusion; References; 5 Proposed Digital Surveillance Software; 5.1 Introduction; 5.2 System Analysis and Design; 5.3 Product Features and How It Works; 5.4 The Solution (A-BOT); 5.5 Advantages of the Proposed System; 5.6 Conclusion; References

Browse Subjects

Show more subjects...

Statistics

from
to
Export