info@elizadeuniversity.edu.ng +234-7083611621, +234-8165744490

STAFF PROFILE

Picture
Name Joshua J. Tom, PhD
Email joshua.tom@elizadeuniversity.edu.ng
Phone 08030781045
About

Dr. Joshua J. Tom received his Ph.D. degree in Computer Science with specialization in Cyber Security from Federal University of Technology, Akure, Nigeria in 2018. He received M.Tech. degree in Computer Science from Federal University of Technology, Akure, Nigeria in 2012, and B.Sc. degree in Computer Science from University of Uyo, Uyo, Nigeria in 1997. He is currently a research fellow and lecturer in the Department of Mathematics and Computer Science, Faculty of Basic and Applied Sciences of Elizade University, Ilara-Mokin, Nigeria. His current research interests are information and cyber security, cryptography, artificial intelligence and machine learning, security of cyber-physical systems, internet of things and related technologies, and software engineering. He is a member of several professional bodies including Cyber Security Experts Association of Nigeria (CSEAN), Nigeria Computer Society (NCS) and Computer Professionals of Nigeria (CPN), and an Associate Fellow, African Academics Network (AAN).

Position
Rank
Department Mathematics and Computer Science Department

Education

Certificate Institution Year
PhD Federal University of Technology, Akure, Nigeria 2018
MTech Federal University of Technology, Akure, Nigeria 2015
BSc. University of Uyo, Nigeia 1997

Work Experience

Employer Address Duration Position

Publications

Automated Cover Text-based Linguistic Steganographic Model Using LSTM and Huffman Coding. View
Automated Model for Data Protection Regulation Compliance Monitoring and Enforcement. View
Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems. View
Design Framework of Cyber Security Solutions to Threats and Attacks on Critical Infrastructure of Electricity Power Systems of Nigeria Companies. View
An Expert System that Detect, Investigate And Report Plagiarism on the Internet. View
Tackling Crime through the Design of an Enhanced Crime Mapping System. View
ESOBSTEB SIP- DDoS defense tool: An aggressive defense framework for detecting and Countering Flood based SIP-App (D)DoS attacks on the internet. View
Cyberspace: Mitigating Against Cyber security threats and attacks. View
A Prediction Model for Information Diffusion in Online Social Network. View
. A Cancelable Biometric Based Security Protocol for Online Banking System. View
Efficient Anonymous Key Exchange Protocol for Roaming in Wireless Networks. View
A Neuro-Fussy Based Model for Diagnosis of Monkeypox Diseases. View
Performance and Security of Group Signature in Wireless Networks. International Journal of Computer View
Resource Allocation Management in LTE System Using Prioritized Deficit Round Robin (DDR) Scheduling Algorithm. View

Professional Bodies

Certification Professional body Country