Browsing by Author Olalere, Morufu

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 33 to 52 of 61 < previous   next >
Issue DateTitleAuthor(s)
2019Machine Learning Approach for Detection of Spam Url: Performance Evaluation of Selected AlgorithmsOkpanachi, Ahiaba Moses; Olalere, Morufu
2017Mitigation of Sybil Attack on A Campus Network (Canet) Using Inter-Arrival Time Threshold and Physical Address ComparisonWaziri, Onomza Victor; Jimoh, Balikis Bukola; Olalere, Morufu; Abdulhamid, Shafi'I Muhammad; Idris, Ismaila
2015Multi-Layer Access Control for Bring Your Own Device EnvironmentOlalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol
2014N-Cryptographic Multilevel Algorithm for Effective Information SecurityAdebayo, Olawale S.; Olalere, Morufu; Mishra, Amit; Mabayoje, M. A.; Ugwu, Joel N.
2014N-Cryptographic Multilevel Algorithm for Effective Information SecurityAdebayo, Olawale Surajudeen; Olalere, Morufu; Mishra, Amit; Ugwu, Joel N.; Mabayoje, Modina A.
2018A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection AttackOlalere, Morufu; Egigogo, Raji Abdullahi; Ojeniyi, Joseph A; Ismaila, Idris; Jimoh, Rasheed Gbenga
2015-05Organizational Attendance Record System: Fraud and A Proposed Facial Recognition TechniqueOlalere, Morufu; Osho, Femi; Ojeniyi, Adebayo J.; Ugwu, Joel N.
2019Performance Evaluation of Machine Learning Algorithms for Hypertext Transfer Protocol Distributed Denial of Service Intrusion DetectionUmar, Rukaya; Olalere, Morufu; Idris, Ismaila; Egigogo, Raji Abdullahi; Bolarin, G,
2019-09Performance Evaluation of Ant Lion Optimization and Particle Swarm Optimiztion for Uncapacitated Facility Location Problem (UFLP)Shehu, Hussaina; Olalere, Morufu
2019Performance Evaluation of Machine Learning Algorithms for Hypertext Transfer Protocol Distributed Denial of Service Intrusion DetectionUmar, Rukayya; Olalere, Morufu; Idris, Ismail; Raji, Abdullahi Egigogo; Bolarin, Gbolahan
2019Phishing Attack Detection Based on Random Forest with Wrapper Feature Selection MethodAbdulrahman, Musbau Dogo; Alhassan, John K; Adebayo, Olawale Surajudeen; Ojeniyi, Joseph Adebayo; Olalere, Morufu
2019-12Phishing Attack Detection Based on Random Forest with Wrapper Feature Selection MethodAbdulrahaman, Musbau Dogo; Alhassan, John K.; Adebayo, Olawale Surajudeen; Ojeniyi, Josephy A.; Olalere, Morufu
2019-12Phishing Attack Detection Based on Random Forest with Wrapper Feature Selection MethodAbdulrahaman, Musbau Dogo; Alhassan, J. K.; Adebayo, Olawale Surajudeen; Ojeniyi, Ojeniyi A.; Olalere, Morufu
2016-12Proposed Discriminative Lexical Features for Real-time Detection of Malware Uniform Resource LocatorOlalere, Morufu; Abdullah, Mohd Taufik; Mahmod &, Ramlan; Abdullah, Azizol
2019-12Random Forest Based Hypertext Transfer Protocol Distributed Denial of Service Attack Detection System for Cloud Computing EnvironmentOlalere, Morufu; Umar, Rukkaya; Ndunagu, Juliana; Idris, Ismaila; Egigogo, Raji Abdullahi; Nasir, Suleiman Muhammad
2016Real-Time Malware Uniform Resource Locator Detection: Identification of Novel Discriminative Features through Manual Examination and Empirical AnalysisOlalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol
2017Real-time Malware URL detection system based on Multi-layer Perceptron Neural NetworksAbdullah, Mohd Taufik; Olalere, Morufu; Mahmod, Ramlan; Abdullah, Azizol
2015-04-10A Review of Bring Your Own Device on Security IssuesOlalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol
2011Security Application in Bluetooth TechnologyOlalere, Morufu; Ismaila, Idris
2021Sooner Lightweight cryptosystem: Towards Privacy Preservation of Resource-Constrained DevicesAlfa, Abraham Ayegba; Alhassan, John Kolo; Olaniyi, Olayemi Mikail; Olalere, Morufu