DIKUL - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2
hits: 13
1.
  • Mal-Detect: An intelligent ... Mal-Detect: An intelligent visualization approach for malware detection
    Falana, Olorunjube James; Sodiya, Adesina Simon; Onashoga, Saidat Adebukola ... Journal of King Saud University. Computer and information sciences, 05/2022, Volume: 34, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    Recent outbreaks of pandemics have deepened the adoption and use of IT-based systems. This development has led to an exponential increase in cyberattacks caused by malware. Current approaches ...
Full text
Available for: UL
2.
  • A Cognitive Rail Track Brea... A Cognitive Rail Track Breakage Detection System Using Artificial Neural Network
    Vincent, Olufunke Rebecca; Babalola, Yetunde Ebunoluwa; Sodiya, Adesina Simon ... Applied Computer Systems, 12/2021, Volume: 26, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Rail track breakages represent broken structures consisting of rail track on the railroad. The traditional methods for detecting this problem have proven unproductive. The safe operation of rail ...
Full text
Available for: UL

PDF
3.
  • A Fuzzy-Based Control Syste... A Fuzzy-Based Control System for Customers’ Admission in a Two-Station Queue Network
    Gbadebo, Adegbuyi David; Akinwale, Adio Taofiki; Sodiya, Adesina Simon ... Journal of Advances in Mathematics and Computer Science, 12/2023, Volume: 38, Issue: 11
    Journal Article

    The study proposes a fuzzy-based control of admission of customers in a queue network with two stations in tandem. Each of the stations has individual arrival streams which may either be accepted or ...
Full text
Available for: UL
4.
  • PHISHGEM: a mobile game-bas... PHISHGEM: a mobile game-based learning for phishing awareness
    Tinubu, Carolyn Oreoluwa; Falana, Olorunjube James; Oluwumi, Enoch Okikijesu ... Journal of cyber security, 07/03/2023, 2023-07-03, Volume: 7, Issue: 3
    Journal Article
    Peer reviewed

    Phishing attacks have become the most effective means of gaining unauthorized access to confidential information in the cyberspace. Unfortunately, many Internet users cannot identify phishing ...
Full text
Available for: UL
5.
  • An Intelligent Model for DD... An Intelligent Model for DDoS Attack Detection and Flash Event Management
    Tinubu, Oreoluwa Carolyn; Sodiya, Adesina Simon; Ojesanmi, Olusegun Ayodeji ... International journal of distributed artificial intelligence, 05/2022, Volume: 14, Issue: 1
    Journal Article
    Peer reviewed

    Distributed Denial of Service (DDoS) attacks are the foremost security concerns on the Internet. DDoS attacks and a similar occurrence called Flash Event (FE) signify anomalies in the normal network ...
Full text
Available for: UL
6.
  • A natural language architec... A natural language architecture
    SODIYA, ADESINA SIMON Journal of computing and information technology, 2007, Volume: 15, Issue: 1
    Journal Article, Paper
    Peer reviewed
    Open access

    Natural languages are the latest generation of programming languages, which require processing real human natural expressions. Over the years, several groups or researchers have trying to develop ...
Full text
Available for: UL

PDF
7.
  • MULTI-LEVEL AND SECURED AGE... MULTI-LEVEL AND SECURED AGENT-BASED INTRUSION DETECTION SYSTEM
    SODIYA, ADESINA SIMON Journal of computing and information technology, 2006, Volume: 14, Issue: 3
    Journal Article, Paper
    Peer reviewed
    Open access

    Since Intrusion Detection System (IDS) has become necessary security tool for detecting attacks on computer network and resources, it is therefore essential to improve on previous designs. In past, ...
Full text
Available for: UL

PDF
8.
  • A credible cost-sensitive m... A credible cost-sensitive model for intrusion response selection
    Ikuomola, Aderonke Justina; Sodiya, Adesina Simon 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN), 2012-Nov.
    Conference Proceeding

    The goal of co st-sensitive response system is to ensure that response cost does not outweigh the intrusion cost. In order to ensure this, some cost-sensitive response models have been developed. ...
Full text
Available for: UL
9.
Full text
Available for: UL

PDF
10.
  • A Strategic Review of Exist... A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems
    Adebukola Onashoga, S.; D. Akinde, Adebayo; S. Sodiya, Adesina Issues in informing science & information technology education, 2009, Volume: 6
    Journal Article
    Open access

    Intrusion Detection Systems (IDS) is defined as a component that analyses system and user operations in computer and network systems in search of activities considered undesirable from security ...
Full text
Available for: UL

PDF
1 2
hits: 13

Load filters