Charles A. Shoniregun

According to our database1, Charles A. Shoniregun authored at least 45 papers between 2002 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Welcome message.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

2015
Keynote speaker 3: Can the Cloud be secured...?
Proceedings of the 2015 World Congress on Internet Security, 2015

PhD and Doctorate Consortium.
Proceedings of the 2015 World Congress on Industrial Control Systems Security, 2015

2014
Confidential initial identification and other improvements for UMTS security.
Secur. Commun. Networks, 2014

2013
WorldCIS-2013: Keynote speaker 4.
Proceedings of the 2013 World Congress on Internet Security, 2013

ICITST-2013: Keynote speaker 4: Writing a sustainable research paper.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2012
Digital forensic research - The analysis of user input on volatile memory of Windows application.
Proceedings of the 2012 World Congress on Internet Security, 2012

Anti-phishing prevention measure for email systems.
Proceedings of the 2012 World Congress on Internet Security, 2012

Machine learning approach towards email management.
Proceedings of the 2012 World Congress on Internet Security, 2012

2011
Security of mobile Internet access with UMTS/HSDPA/LTE.
Proceedings of the 2011 World Congress on Internet Security, 2011

Security review of email summarization systems.
Proceedings of the 2011 World Congress on Internet Security, 2011

UMTS security: Enhancement of identification, authentication and key agreement protocols.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2010
Electronic Healthcare Information Security
Advances in Information Security 53, Springer, ISBN: 978-0-387-84817-4, 2010

2009
Applying semantic web and user behavior analysis to enforce the intrusion detection system.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Mixed load balance strategy to improve performance efficacy for three tiers Peer-to-Peer network topology.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

The society and electronic government usage.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

2008
A novel approach in securing DDoS attack.
Proceedings of the CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, 2008

Addressing the vulnerability of the 4-way handshake of 802.11i.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

A framework for culture influence Virtual Learning Environments trust.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

The softphone security.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

A NetFlow based internet-worm detecting system in large network.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

Electronic government paradigm.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

The Societal Dimension of e-Government in UK.
Proceedings of the 2008 International Conference on E-Learning, 2008

2007
SET: A Questionable Security Protocol.
Proceedings of the WEBIST 2007, 2007

Towards local resource redirection across thin client protocols.
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007

Critical Review of Unsecured WEP.
Proceedings of the 2007 IEEE International Conference on Services Computing, 2007

Synchronizing Internet Protocol Security (SIPSec)
Advances in Information Security 34, Springer, ISBN: 978-0-387-32724-2, 2007

2005
Securing XML Query Processing Storage.
Australas. J. Inf. Syst., 2005

Impacts of E-Learning on Organisational Strategy.
Proceedings of the WEBIST 2005, 2005

A secure framework for managing transactional properties of business objects.
Proceedings of the ICETE 2005, 2005

Securing Organisational Internal E-Learning Development.
Proceedings of the 5th IEEE International Conference on Advanced Learning Technologies, 2005

Securing Mobile Product Ecology for Mobile Commerce (mC).
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

SOA Without Web Services: a Pragmatic Implementation of SOA for Financial Transactions Systems.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

Impacts and Risk Assessment of Technology for Internet Security - Enabled Information Small-Medium Enterprises (TEISMES)
Advances in Information Security 17, Springer, ISBN: 978-0-387-24343-6, 2005

2004
An investigation of information systems project failure and its implication on organisations.
Int. J. Serv. Technol. Manag., 2004

Is cybermediation really the future or risk?
Int. J. Electron. Bus., 2004

Securing XML Documents.
Australas. J. Inf. Syst., 2004

Can eCRM and Trust Improve eC Customer Base?
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004

Streaming and security of art works on the Web.
Proceedings of the Sixth IEEE International Symposium on Multimedia Software Engineering, 2004

Classification and taxonomy of TEISMEs.
Proceedings of the 6th International Conference on Electronic Commerce, 2004

2003
Is E-learning really the future or a risk?
Ubiquity, 2003

Is child internet access a questionable risk?
Ubiquity, 2003

Intellectual property rights of multimedia enriched websites.
Ubiquity, 2003

Are existing internet security measures guaranteed to protect user identity in the financial services industry?
Int. J. Serv. Technol. Manag., 2003

2002
The future of internet security.
Ubiquity, 2002


  Loading...