Application of fuzzy association rule mining for analysing students academic performance OO Oladipupo, OJ Oyelade, DO Aborisade International Journal of Computer Science Issues (IJCSI) 9 (6), 2012 | 8 | 2012 |
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016: Volume 2 Y Bi, S Kapoor, R Bhatia Springer, 2017 | 6 | 2017 |
Selective harmonic elimination in multilevel inverter using real coded genetic algorithm initialized Newton Raphson method IA Adeyemo, DO Aborisade, JA Ojo International Journal of Engineering Research & Technology 2 (9), 3107-3113, 2013 | 5 | 2013 |
A survivability model for object-oriented software systems AS Sodiya, DO Aborisade, AJ Ikuomola 2012 Fourth International Conference on Computational Aspects of Social …, 2012 | 5 | 2012 |
A real-time observation approach for assessing the impact of social media on students’ academic performance S Agholor, AO Agholor, DO Aborisade The Journal of Social Media in Society 9 (2), 214-235, 2020 | 3 | 2020 |
A Preferential Analysis of Existing Password Managers from End-Users’ View Point S Agholor, AS Sodiya, AT Akinwale, OJ Adeniran, DO Aborisade International Journal of Cyber-Security and Digital Forensics 5 (4), 187-196, 2016 | 2 | 2016 |
An Improved Cost-Sensitive Intrusion Response Model. AJ Ikuomola, AS Sodiya, AT Akinwale, DO Aborisade Journal of Information Assurance & Security 8 (3), 2013 | 2 | 2013 |
HierarchyMap: A Novel Approach to Treemap Visualization of Hierarchical Data DO Aborisade, J Oyelade Glob. J. Comput. Sci. Technol 5, 77-81, 2010 | 2 | 2010 |
Towards detecting credit card frauds using Hidden Markov Model CO Tinubu, DO Aborisade, AS Sodiya, SA Onashoga, MA Ganiyu Journal of Computer Science and Its Application 26 (2), 54-63, 2019 | 1 | 2019 |
Resolving DRDoS Attack in Cloud Database Service Using Common Source IP and Incremental Replacement Strategy AD Olaniyi, R Christoph, SA Simon, AA Taofeek, BS Badmus Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016: Volume …, 2018 | 1 | 2018 |
L’accès des étudiants nigérians aux infrastructures des technologies de l’information SA Simeon, AD Olaniyi, G Adegbuyi Revue internationale d’éducation de Sèvres, 85-91, 2014 | 1 | 2014 |
A Cloud-based Password Manager for Multiple Transactions Accounts DO Aborisade, OY Alowosile, KO Odunlami, A Odumosu Proc. of 11th International Conference of Nigeria Computer Society, Iloko …, 2013 | 1 | 2013 |
Detecting ddos attacks in software defined networking DO Aborisade, MK Kareem, SA Onashoga, CO Tinubu, S Agholor | 1 | |
A QR® Code Authentication Scheme for Signature Hiding I OMOFAYE, SA Onashoga, DO Aborisade, BI Olajuwon | | 2023 |
Modeling recurrence of COVID-19 and its variants using recurrent neural network JD Bolarinwa, OR Vincent, DO Aborisade, CA Adenusi, CO Ugwunna Bulletin of Electrical Engineering and Informatics 12 (1), 380-386, 2023 | | 2023 |
A Mathematical Model for Resolving Minimum Password Length Controversy S Agholor, AS Sodiya, DO Aborisade International Journal of Cyber-Security and Digital Forensics 7 (1), 1-10, 2018 | | 2018 |
A Persuasive System for Influencing Mobile Phone Users’ Locking Behavior S Agholor, DO Aborisade, A Onuodafin Scientific and practical cyber security journal, 2018 | | 2018 |
Call Response Rate As Baseline for Detecting DRDoS Attack in Cloud Database Service DO Aborisade, C Reich, AS Sodiya, AT Akinwale Software-Technologien und-Prozesse: Open-Source Software in der Industrie …, 2016 | | 2016 |
A SURVIVABLE DISTRIBUTED DATABASE AGAINST BYZANTINE FAILURE DO ABORISADE, AS SODIYA, AA ODUMOSU, OY ALOWOSILE, ... Journal of Natural Sciences Engineering and Technology 15 (2), 61-72, 2016 | | 2016 |
Digital Forensics System for Retrieving Contacts on Mobile Phones DO Aborisade, OY Alowosile, AA Odumosu, AA Adedeji, O Odunayo Proceedings of International Multidisciplinary and Interdisciplinary …, 2015 | | 2015 |