Virginia E. Ejiofor

Work place: Department of Computer Science, Nnamdi Azikiwe University, Awka, Nigeria

E-mail: virguche2004@yahoo.com

Website:

Research Interests: Computer Science & Information Technology, Human-Computer Interaction, Computer systems and computational processes, Systems Architecture, Solid Modeling, Computer Networks, Information Security, Information Systems, Database Management System, Information Storage Systems

Biography

Virginia Ebere Ejiofor holds BSc, MSc, and PhD all in Computer Science. She has been teaching Computer Science since 1997 and had published in a variety of local and international journals. Dr Ejiofor is a member of many professional bodies such as Computer Professionals (Registration Council) of Nigeria (CPN), Nigeria Computer Society (NCS), British Computer Society (BCS), Computer Forensics Institute, Nigeria (CFIN), Free and Open Source Software for Africa (FOSSFA), Open Source Foundation of Nigeria (OSFON), Association of Computing Machinery (ACM). She became a Fellow of BCS in 2010 and a Fellow of Institute of Corporate Administration of Nigeria in 2012. She served as a council member of CPN from 2009 to 2013 and is presently a council member of NCS. She was the past Editor-in-Chief of the Journal of Computer Science and its Applications. From 2011 to 2014 she was the Head of the Computer Science Department, Nnamdi Azikiwe University, Awka. Her interests include Distributed Database, Information Systems, Complex Networks, Modeling of Dynamical systems and Human Computer Interaction.

Author Articles
Towards Modeling Malicious Agents in Decentralized Wireless Sensor Networks: A Case of Vertical Worm Transmissions and Containment

By ChukwuNonso H. Nwokoye Virginia E. Ejiofor Moses O. Onyesolu Boniface Ekechukwu

DOI: https://doi.org/10.5815/ijcnis.2017.09.02, Pub. Date: 8 Sep. 2017

Now, it is unarguable that cyber threats arising from malicious codes such as worms possesses the ability to cause losses, damages and disruptions to industries that utilize ICT infrastructure for meaningful daily work. More so for wireless sensor networks (WSN) which thrive on open air communications. As a result epidemic models are used to study propagation patterns of these malicious codes, although they favor horizontal transmissions. Specifically, the literature dealing with the analysis of worms that are both vertically and horizontally (transmitted) is not extensive. Therefore, we propose the Vulnerable–Latent–Breaking Out–Temporarily Immune–Inoculation (VLBTV-I) epidemic model to investigate both horizontal and vertical worm transmission in wireless sensor networks. We derived the solutions of the equilibriums as well as the epidemic threshold for two topological expressions (gleaned from literature). Furthermore, we employed the Runge-Kutta-Fehlberg order 4 and 5 method to solve, simulate and validate our proposed models. Critically, we analyzed the impact of both vertical and horizontal transmissions on the latent and breaking out compartments using several simulations experiments.

[...] Read more.
Pre-quarantine Approach for Defense against Propagation of Malicious Objects in Networks

By ChukwuNonso H. Nwokoye Godwin C. Ozoegwu Virginia E. Ejiofor

DOI: https://doi.org/10.5815/ijcnis.2017.02.06, Pub. Date: 8 Feb. 2017

This paper revisits malicious object propagation in networks using epidemic theory in such a manner that it proposes the (Pre-quarantining) of nodes in networks. This is a concept that is known by experience to be a standard disease control procedure that involves screening and quarantining of immigrants to a population. As preliminary investigation we propose the Q-SEIRS model and the more advanced Q-SEIRS-V model for malicious objects’ spread in networks. This Pre-quarantine concept addresses and implements the “assume guilty till proven innocent” slogan of the cyber world by providing a mechanism for pre-screening, isolation and treatment for incoming infected nodes. The treated nodes from the pre-quarantine compartment are sent to the recovered compartment while the free nodes join the network population. The paper also derived the reproduction number, equilibria, as well as local stability of the proposed model. Numerical methods are employed to solve the system of equations and MATLAB is used to simulate the system so as to visualize the dynamical behavior of the models. It is seen that pre-screening/pre-quarantining improves the recovery rate in relative terms.

[...] Read more.
Other Articles