Adesina S. Sodiya

According to our database1, Adesina S. Sodiya authored at least 28 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A predictive model for phishing detection.
J. King Saud Univ. Comput. Inf. Sci., 2022

Mal-Detect: An intelligent visualization approach for malware detection.
J. King Saud Univ. Comput. Inf. Sci., 2022

2021
Performance Assessment of some Phishing predictive models based on Minimal Feature corpus.
J. Digit. Forensics Secur. Law, June, 2021

A Cognitive Rail Track Breakage Detection System Using Artificial Neural Network.
Appl. Comput. Syst., 2021

2019
Towards a UMLsec-Based Proctored Examination Model.
Int. J. Syst. Softw. Secur. Prot., 2019

Privacy Preserving Location-Based Client-Server Service Using Standard Cryptosystem.
J. Comput. Inf. Technol., 2019

2018
A Users' Awareness Study and Influence of Socio-Demography Perception of Anti-Phishing Security Tips.
Acta Informatica Pragensia, 2018

2017
An Anti-Phishing Kit Scheme for Secure Web Transactions.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
A Framework for Protecting Users' Privacy in Cloud.
Int. J. Inf. Secur. Priv., 2016

Resolving DRDoS Attack in Cloud Database Service Using Common Source IP and Incremental Replacement Strategy.
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016, 2016

Anti-Phishing Research: The Journey so Far.
Proceedings of the 2nd International Conference on Computing Research and Innovations, 2016

2015
An Adaptive and Collaborative Server-Side SMS Spam Filtering Scheme Using Artificial Immune System.
Inf. Secur. J. A Glob. Perspect., 2015

2012
A One-Time Server-Specific Password Authentication Scheme.
J. Comput. Inf. Technol., 2012

A survivability model for object-oriented software systems.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

A credible cost-sensitive model for intrusion response selection.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
An Improved Semi-Global Alignment Algorithm for Masquerade Detection.
Int. J. Netw. Secur., 2011

A countermeasure algorithm for password guessing attacks.
Int. J. Inf. Comput. Secur., 2011

A Secure e-Voting Architecture.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

A Confidential Electronic Result Transfer Using a Hybrid XML Security Scheme.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

A Mobile Phone-Based Antenatal Care Support System.
Proceedings of the 21st International Conference on Systems Engineering (ICSEng 2011), 2011

2010
An Integrated Decision Support System for Intercropping.
Int. J. Decis. Support Syst. Technol., 2010

2009
Mining of prevalent ailments in a health database using FP-growth algorithm.
Proceedings of the Selected Papers on Broadband Communication, 2009

2007
An Expert System-Based Site Security Officer.
J. Comput. Inf. Technol., 2007

A Natural Language Architecture.
J. Comput. Inf. Technol., 2007

2006
Multi-Level and Secured Agent-Based Intrusion Detection System.
J. Comput. Inf. Technol., 2006

2005
Maintaining privacy in anomaly-based intrusion detection systems.
Inf. Manag. Comput. Security, 2005

An improved two-tiered strategy to intrusion detection.
Inf. Manag. Comput. Security, 2005

2004
A new two-tiered strategy to intrusion detection.
Inf. Manag. Comput. Secur., 2004


  Loading...