Adio T. Akinwale

According to our database1, Adio T. Akinwale authored at least 24 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A predictive model for phishing detection.
J. King Saud Univ. Comput. Inf. Sci., 2022

2020
Toward ontology-based risk management framework for software projects: An empirical study.
J. Softw. Evol. Process., 2020

AyoPeer: The adapted ayo-game for minimizing free riding in peer-assisted network.
Peer-to-Peer Netw. Appl., 2020

2019
CK-RAID: Collaborative Knowledge Repository for Intrusion Detection System.
J. Comput. Inf. Technol., 2019

2018
A Users' Awareness Study and Influence of Socio-Demography Perception of Anti-Phishing Security Tips.
Acta Informatica Pragensia, 2018

2017
KC-Slice: A dynamic privacy-preserving data publishing technique for multisensitive attributes.
Inf. Secur. J. A Glob. Perspect., 2017

A cognitive buying decision-making process in B2B e-commerce using Analytic-MLP.
Electron. Commer. Res. Appl., 2017

2013
Efficient n-Gram-Based String Matching in Electronic Testing at Programming.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2013

2012
Towards an Ontological Approach to Information System Security and Safety Requirement Modeling and Reuse.
Inf. Secur. J. A Glob. Perspect., 2012

Password Authentication Scheme with Secured Login Interface
CoRR, 2012

2011
A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements.
Int. J. Inf. Secur. Priv., 2011

Hierarchical Database Model for Querying Economic Network Independence Distribution.
Int. J. Decis. Support Syst. Technol., 2011

TCP Window Based Congestion Control -Slow-Start Approach.
Commun. Netw., 2011

Visualizing and Assessing a Compositional Approach to Service-Oriented Business Process Design Using Unified Modelling Language (UML).
Comput. Inf. Sci., 2011

Service Oriented Application in Agent Based Virtual Knowledge Community.
Comput. Inf. Sci., 2011

2010
An Integrated Decision Support System for Intercropping.
Int. J. Decis. Support Syst. Technol., 2010

Using Visual Analytics to Develop Situation Awareness in Network Intrusion Detection System.
Comput. Inf. Sci., 2010

2009
A conceptual analysis and design of a management system for "Ifa" (an African traditional oracle).
Kybernetes, 2009

The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases
CoRR, 2009

Mining of prevalent ailments in a health database using FP-growth algorithm.
Proceedings of the Selected Papers on Broadband Communication, 2009

An automated interactive voice response for agricultural extension system.
Proceedings of the Selected Papers on Broadband Communication, 2009

2008
Visualizing Concurrency Control Algorithms for Real-Time Database Systems.
Data Sci. J., 2008

2005
Maintaining privacy in anomaly-based intrusion detection systems.
Inf. Manag. Comput. Security, 2005

2004
A new two-tiered strategy to intrusion detection.
Inf. Manag. Comput. Secur., 2004


  Loading...