Evidence of personality traits on phishing attack menace among selected university undergraduates in Nigeria RE Yoro, FO Aghware, MI Akazue, AE Ibor, AA Ojugo International Journal of Electrical and Computer Engineering (IJECE) 13 (2 …, 2023 | 31 | 2023 |
Secure health information system with blockchain technology A Ibor, E Edim, A Ojugo Journal of the Nigerian Society of Physical Sciences, 992-992, 2023 | 26 | 2023 |
Novel hybrid model for intrusion prediction on cyber physical systems’ communication networks based on bio-inspired deep neural network structure AE Ibor, OB Okunoye, FA Oladeji, KA Abdulsalam Journal of Information Security and Applications 65, 103107, 2022 | 20 | 2022 |
Conceptualisation of Cyberattack prediction with deep learning AE Ibor, FA Oladeji, OB Okunoye, OO Ekabua Cybersecurity 3, 1-14, 2020 | 18 | 2020 |
A survey of cyber security approaches for attack detection prediction and prevention AE Ibor, FA Oladeji, OB Okunoye International Journal of Security and its Applications 12 (4), 15-28, 2018 | 18 | 2018 |
Application of machine learning and resampling techniques to credit card fraud detection CL Udeze, IE Eteng, AE Ibor Journal of the Nigerian Society of Physical Sciences, 769-769, 2022 | 17 | 2022 |
Hybrid fake news detection technique with genetic search and deep learning OB Okunoye, AE Ibor Computers and Electrical Engineering 103, 108344, 2022 | 11 | 2022 |
Novel adaptive cyberattack prediction model using an enhanced genetic algorithm and deep learning (AdacDeep) AE Ibor, FA Oladeji, OB Okunoye, CO Uwadia Information Security Journal: A Global Perspective 31 (1), 105-124, 2022 | 10 | 2022 |
Zero day exploits and national readiness for cyber-warfare AE Ibor Nigerian Journal of Technology 36 (4), 1174-1183, 2017 | 9 | 2017 |
A hybrid mitigation technique for malicious network traffic based on active response AE Ibor, G Epiphaniou International Journal of Security and Its Applications 9 (4), 63-80, 2015 | 9 | 2015 |
System hardening architecture for safer access to critical business data AE Ibor, JN Obidinnu Nigerian Journal of Technology 34 (4), 788-792, 2015 | 7 | 2015 |
A survey of Attacks on VoIP networks and Countermeasures JN Obidinnu, AE Ibor West African Journal of Industrial and Academic Research 14 (1), 28-38, 2015 | 6 | 2015 |
Deep learning model for preicting multistage cyber attacks AE Ibor, FA Oladeji, OB Okunoye, CO Uwadia Journal of Computer Science and Its Application 26 (1), 2019 | 4 | 2019 |
A Conceptual Framework for Augmenting the Security of Digitized Academic Records in Nigerian Tertiary Institutions using Blockchain Technology AE Ibor, OA Ofem, JN Obidinnu International Journal of Information Security, Privacy and Digital Forensics …, 2018 | 3 | 2018 |
Improving the security of MANETs oriented military intelligence using biometrics authentication technologies JN Obidinnu, AE Ibor, SOO Duke Scientific Research Journal (SCIRJ) 2 (1), 43-48, 2014 | 2 | 2014 |
Network Intrusion Prediction Model based on Bio-inspired Hyperparameter Search A Ibor, F Oladeji, O Okunoye, K Abdulsalam 2021 International Conference on Electrical, Computer and Energy …, 2021 | 1 | 2021 |
AN IMPROVED CYBERATTACK PREDICTION TECHNIQUE WITH INTELLIGENT CLUSTERING AND DEEP NEURAL NETWORK AE Ibor, FA Oladeji, OB Okunoye, OO Ekabua FUW Trends in Science & Technology Journal 5 (1), 15-22, 2020 | 1 | 2020 |
AN ENSEMBLE TECHNIQUE FOR PREDICTING MALICIOUS NETWORK TRAFFIC AE Ibor, FA Oladeji, OB Okunoye, M Agana 14th International Conference of the Nigeria Computer Society - Smart …, 2019 | 1 | 2019 |
SIMPBOARD –A MONGODB IMPLEMENTATION OF A SIMPLIFIED ONLINE BULLETIN BOARD SYSTEM FOR INFORMATION DISSEMINATION IN TERTIARY INSTITUTIONS AE Ibor, KE Eyong, EB Edim Nigerian Journal of Technology 36 (3), 897-903, 2017 | 1 | 2017 |
Trustworthy Cross-Border Interoperable Identity System for Developing Countries AE Ibor, M Hooper, C Maple, G Epiphaniou arXiv preprint arXiv:2310.16562, 2023 | | 2023 |