Search Results

Now showing 1 - 10 of 46
  • Conference Object
    Citation - Scopus: 7
    Comparative Study of Cognitive Complexity Measures
    (2008) Misra,S.; Akman,I.
    Complexity metrics are used to predict critical information about reliability and maintainability of software systems. Cognitive complexity measure based on cognitive informatics, plays an important role in understanding the fundamental characteristics of software, therefore directly affects the understandability and maintainability of software systems. In this paper, we compared available cognitive complexity measures and evaluated cognitive weight complexity measure in terms of Weyuker's properties. © 2008 IEEE.
  • Conference Object
    A Multi-Paradigm Complexity Metric (mcm)
    (2011) Misra,S.; Akman,I.; Cafer,F.
    Huge amount of researches and software metrics have been proposed for procedural and object-oriented languages. However, there are only few metrics available in the literature related with multi-paradigm programming languages. In this paper, we propose a metric to evaluate the code written in multi-paradigm language. Our proposed metric can be used for most of the programming paradigms, including both procedural and object-oriented languages. © 2011 Springer-Verlag.
  • Conference Object
    Citation - Scopus: 12
    Design and Implementation of a Mobile Webcast Application With Google Analytics and Cloud Messaging Functionality
    (Institute of Physics Publishing, 2019) Jonathan,O.; Misra,S.; Ibanga,E.; Maskeliunas,R.; Damasevicius,R.; Ahuja,R.
    Church cast is an application developed to bring the messages of ministries closer to their members by harnessing the Internet and mobile devices. Due to the very busy schedules of people and religious restrictions in some countries, people are not usually able to be physically present at their locations of worship to listen to or watch their ministers. Existing applications developed in the past like DOMI radio and Redemption TV Media were limited to only audio, poor and unintuitive user interfaces and not providing the administrator any interactions with the users of the application. In this work, we develop an Android-based application that makes it possible for users to watch live streams and on-demand videos from their ministries using their mobile devices. The application also incorporates sharing and analytics functionalities to enable users to share videos messages with loved ones and help the administrator monitor users' activities on the application respectively. The cloud messaging functionality enables the administrator to send messages such as announcements to user devices as push notifications. This would eventually increase user knowledge and interaction with the activities going on in their respective places of worship. © 2019 Published under licence by IOP Publishing Ltd.
  • Conference Object
    Citation - Scopus: 3
    Conflict resolution via emerging technologies?
    (Institute of Physics Publishing, 2019) Yinka-Banjo,C.; Ugot,O.-A.; Misra,S.; Adewumi,A.; Damasevicius,R.; Maskeliunas,R.
    This paper presents a review of the current techniques and approaches adopted in conflict resolution in Multi-Agent Systems (MAS). The review highlights the strength and weaknesses, and thus, their success in fostering cooperation and collaboration in multi-agent systems. We survey alternative approaches to conflict resolution that rely on emerging technologies such as deep learning. From the survey, we discuss the benefits of using these emerging technologies in the conflict resolution process. © 2019 Published under licence by IOP Publishing Ltd.
  • Conference Object
    Citation - Scopus: 10
    A Model for Measuring Cognitive Complexity of Software
    (Springer Verlag, 2008) Misra,S.; Akman,I.
    This paper proposes a model for calculating cognitive complexity of a code. This model considers all major factors responsible for (cognitive) complexity. The practical applicability of the measure is evaluated through experimentation, test cases and comparative study. © 2008 Springer-Verlag Berlin Heidelberg.
  • Conference Object
    Citation - Scopus: 5
    A Cognitive Requirement Specification Model
    (2009) Cafer,F.; Misra,S.
    Eliciting/Gathering information from the customers in requirement phase is the most crucial task in the development of the software development process, because this phase builds the base for the success or failure of any software product. Requirements specification process highly depends on the knowledge and mental abilities of the customers. In this paper, we are proposing a cognitive requirement specification model based on the cognitive classification of customers. © 2009 IEEE.
  • Conference Object
    Citation - Scopus: 22
    An Improved Model for Alleviating Layer Seven Distributed Denial of Service Intrusion on Webserver
    (Institute of Physics Publishing, 2019) Odusami,M.; Misra,S.; Adetiba,E.; Abayomi-Alli,O.; Damasevicius,R.; Ahuja,R.
    Application layer or Layer Seven Distributed Denial of service (L7DDoS) intrusion is one of the greatest threats that intrusion a webserver. The hackers have different motives which could be for Extortion, Exfiltration e.t.c Researchers have employed several methods to prevent L7DDoS intrusion especially using machine learning. Although Machine learning techniques has proven to be very effective with high detection accuracy, the approach still find it difficult to detect Hyper Text Transfer Protocol (HTTP) based botnet traffic on web server with high false positive rate. The adoption of deep learning based technique using Long Short Term Memory (LSTM) will alleviate this problem. © 2019 Published under licence by IOP Publishing Ltd.
  • Conference Object
    A Model for Measuring Cognitive Complexity of Software
    (Springer Verlag, 2008) Misra,S.; Akman,I.
    This paper proposes a model for calculating cognitive complexity of a code. This model considers all major factors responsible for (cognitive) complexity. The practical applicability of the measure is evaluated through experimentation, test cases and comparative study. © 2008 Springer-Verlag Berlin Heidelberg.
  • Article
    Citation - Scopus: 48
    Identifying Phishing Attacks in Communication Networks Using Url Consistency Features
    (Inderscience Publishers, 2020) Azeez,N.A.; Salaudeen,B.B.; Misra,S.; Damasevicius,R.; Maskeliunas,R.
    Phishing is a fraudulent attempt by cybercriminals, where the target audience is addressed by a text message, phone call or e-mail, requesting classified and sensitive information after presenting himself/herself as a legitimate agent. Successful phishing attack may result into financial loss and identity theft. Identifying forensic characteristics of phishing attack can help to detect the attack and its perpetuators and as well as to enable defence against it. To shield internet users from phishing assaults, numerous anti-phishing models have been proposed. Currently employed techniques to handle these challenges are not sufficient and capable enough. We aim at identifying phishing sites in order to guard internet users from being vulnerable to any form of phishing attacks by verifying the conceptual and literal consistency between the uniform resource locator (URL) and the web content. The implementation of the proposed PhishDetect method achieves an accuracy of 99.1%; indicating that it is effective in detecting various forms of phishing attacks. © 2020 Inderscience Enterprises Ltd.. All rights reserved.
  • Conference Object
    Citation - Scopus: 1
    A Software Metric for Python Language
    (Springer Verlag, 2010) Misra,S.; Cafer,F.
    There are many metrics for evaluating the quality of codes written in different programming languages. However, no efforts have been done to propose metrics for Python, which is an important and useful language especially for the software development for the embedded systems. In this present work, we are trying to investigate all the factors, which are responsible for increasing the complexity of code written in Python language. Accordingly, we have proposed a unified metric for this language. Practical applicability of the metric is demonstrated on a case study. © 2010 Springer-Verlag Berlin Heidelberg.