Nureni Ayofe Azeez

Orcid: 0000-0002-1475-2612

According to our database1, Nureni Ayofe Azeez authored at least 17 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A cyberstalking-free global network with artificial intelligence approach.
Int. J. Inf. Comput. Secur., 2023

Mitigating Denial of Service Attacks in Fog-Based Wireless Sensor Networks Using Machine Learning Techniques.
CoRR, 2023

2022
Extracted rule-based technique for anomaly detection in a global network.
Int. J. Electron. Secur. Digit. Forensics, 2022

2021
Identification and Detection of Cyberbullying on Facebook Using Machine Learning Algorithms.
J. Cases Inf. Technol., 2021

Windows PE Malware Detection Using Ensemble Learning.
Informatics, 2021

Adopting automated whitelist approach for detecting phishing attacks.
Comput. Secur., 2021

2020
Identifying phishing attacks in communication networks using URL consistency features.
Int. J. Electron. Secur. Digit. Forensics, 2020

2019
Network Intrusion Detection with a Hashing Based Apriori Algorithm Using Hadoop MapReduce.
Comput., 2019

2018
Deeply-learnt damped least-squares (DL-DLS) method for inverse kinematics of snake-like robots.
Neural Networks, 2018

A Fuzzy Expert System for Diagnosing and Analyzing Human Diseases.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2018

Diagnosing Oral Ulcers with Bayes Model.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2018

2012
Towards achieving scalability and interoperability in a triple-domain grid-based environment (3DGBE).
Proceedings of the 2012 Information Security for South Africa, 2012

2011
ANCAEE: A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks.
Wirel. Sens. Netw., 2011

Using Wearable Sensors for Remote Healthcare Monitoring System.
J. Sens. Technol., 2011

Grid Security Loopholes with Proposed Countermeasures.
Proceedings of the Computer and Information Sciences II, 2011

2009
Exploration of the Gap Between Computer Science Curriculum and Industrial I.T Skills Requirements
CoRR, 2009

Approach To Solving Cybercrime And Cybersecurity
CoRR, 2009


  Loading...