Oluwasefunmi 'Tale Arogundade

Orcid: 0000-0001-9338-491X

Affiliations:
  • Federal University of Agriculture, Department of Computer Science, Abeokuta, Nigeria
  • Graduate University of Chinese Academy of Sciences (GUCAS), Beijing, China (PhD 2012)


According to our database1, Oluwasefunmi 'Tale Arogundade authored at least 26 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
SCLAVOEM: hyper parameter optimization approach to predictive modelling of COVID-19 infodemic tweets using smote and classifier vote ensemble.
Soft Comput., March, 2023

A Systematic Literature Review on Human Ear Biometrics: Approaches, Algorithms, and Trend in the Last Decade.
Inf., 2023

2022
Large Dataset of Nigeria Covid-19 Tweets for Sentiment Analysis and Opinion Mining Tasks.
Dataset, August, 2022

Hybrid Model of Genetic Algorithms and Tabu Search Memory for Nurse Scheduling Systems.
Int. J. Serv. Sci. Manag. Eng. Technol., 2022

Contextual Use of IoT Based Water Quality Control System.
Proceedings of the Co-creating for Context in the Transfer and Diffusion of IT, 2022

2021
An Ontology-Based Information Extraction System for Organic Farming.
Int. J. Semantic Web Inf. Syst., 2021

Ontologies in Cloud Computing - Review and Future Directions.
Future Internet, 2021

Cloud-Based Business Process Security Risk Management: A Systematic Review, Taxonomy, and Future Directions.
Comput., 2021

Performance Evaluation of Machine Learning Techniques for Prescription of Herbal Medicine for Obstetrics and Gynecology Problems.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2021

Psychotherapeutic Tool for Addressing Depression in Teenagers Through Video Games.
Proceedings of the Hybrid Intelligent Systems, 2021

2020
Toward ontology-based risk management framework for software projects: An empirical study.
J. Softw. Evol. Process., 2020

A systematic literature review on compliance requirements management of business processes.
Int. J. Syst. Assur. Eng. Manag., 2020

Fuzzy Driven Decision Support System for Enhanced Employee Performance Appraisal.
Int. J. Hum. Cap. Inf. Technol. Prof., 2020

An ontological approach to threats pattern collection and classification: a preliminary study to security management.
Int. J. Electron. Secur. Digit. Forensics, 2020

A study of existing use case extensions and experience: a systematic review.
Int. J. Comput. Math. Comput. Syst. Theory, 2020

Enhancing Misuse Cases With Risk Assessment for Safety Requirements.
IEEE Access, 2020

Harnessing the Potentials of Mobile Phone for Adoption and Promotion of Organic Farming Practices in Nigeria.
Proceedings of the Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation, 2020

An Intelligent Marketspace Mobile Application for Marketing Organic Products.
Proceedings of the Responsible Design, Implementation and Use of Information and Communication Technology, 2020

2019
Towards a UMLsec-Based Proctored Examination Model.
Int. J. Syst. Softw. Secur. Prot., 2019

2018
Towards a compliance requirement management for SMSEs: a model and architecture.
Inf. Syst. E Bus. Manag., 2018

Specifying and Incorporating Compliance Requirements into Software Development Using UML and OCL.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

2016
Towards Ontological Approach to Security Risk Analysis of Information System: Model and Architecture.
Int. J. Secur. Softw. Eng., 2016

2014
Towards ontological approach to eliciting risk-based security requirements.
Int. J. Inf. Comput. Secur., 2014

2012
Towards an Ontological Approach to Information System Security and Safety Requirement Modeling and Reuse.
Inf. Secur. J. A Glob. Perspect., 2012

2011
A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements.
Int. J. Inf. Secur. Priv., 2011

Enhancing Use Cases with Subjective Risk Assessment.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011


  Loading...