Honey Algorithm for Securing and Identifying Hackers in a Pervasive Environment
Last updated: 28 Dec 2024
10.21608/njccs.2023.321171
Cryptography, Honey Encryption, Pervasive, Hackers, security
Yusuf,
Musa
Bingham University Faculty of Science and Technology Department of Computer Science KM 25 Keffi-Abuja Express Way
FAKI,
Ageebee Silas
Bingham University Faculty of Science and Technology Department of Computer Science KM 25 Keffi-Abuja Express Way
Adelaiy
e
Bingham University Faculty of Science and Technology Department of Computer Science KM 25 Keffi-Abuja Express Way
Ishaya
Oluwasegun
Bingham University Faculty of Science and Technology Department of Computer Science KM 25 Keffi-Abuja Express Way
5
1
43920
2023-06-01
2023-10-12
2023-06-01
2
9
2805-2366
2805-2374
https://njccs.journals.ekb.eg/article_321171.html
https://njccs.journals.ekb.eg/service?article_code=321171
321,171
Original Article
2,134
Journal
Nile Journal of Communication and Computer Science
https://njccs.journals.ekb.eg/
Honey Algorithm for Securing and Identifying Hackers in a Pervasive Environment
Details
Type
Article
Created At
28 Dec 2024