Security and privacy issues in e-health cloud-based system: A comprehensive content analysis NA Azeez, C Van der Vyver Egyptian Informatics Journal 20 (2), 97-108, 2019 | 154 | 2019 |
Windows PE malware detection using ensemble learning NA Azeez, OE Odufuwa, S Misra, J Oluranti, R Damaševičius Informatics 8 (1), 10, 2021 | 84 | 2021 |
Using wearable sensors for remote healthcare monitoring system AP Abidoye, NA Azeez, AO Adesina, KK Agbele, HO Nyongesa Journal of Sensor Technology 2011, 2011 | 83 | 2011 |
Intrusion detection and prevention systems: an updated review NA Azeez, TM Bada, S Misra, A Adewumi, C Van der Vyver, R Ahuja Data Management, Analytics and Innovation: Proceedings of ICDMAI 2019 …, 2020 | 64 | 2020 |
Cyber security: Challenges and the way forward NA Ayofe, B Irwin Comput. Sci. Telecommun. 29, 56-69, 2010 | 60 | 2010 |
Identifying phishing attacks in communication networks using URL consistency features NA Azeez, BB Salaudeen, S Misra, R Damaševičius, R Maskeliūnas International Journal of Electronic Security and Digital Forensics 12 (2 …, 2020 | 58 | 2020 |
Adopting automated whitelist approach for detecting phishing attacks NA Azeez, S Misra, IA Margaret, L Fernandez-Sanz Computers & Security 108, 102328, 2021 | 51 | 2021 |
Network intrusion detection with a hashing based apriori algorithm using Hadoop MapReduce NA Azeez, TJ Ayemobola, S Misra, R Maskeliūnas, R Damaševičius Computers 8 (4), 86, 2019 | 50 | 2019 |
Ancaee: A novel clustering algorithm for energy efficiency in wireless sensor networks AP Abidoye, NA Azeez, AO Adesina, KK Agbele Scientific Research Publishing, 2011 | 41 | 2011 |
CyberProtector: identifying compromised URLs in electronic mails with Bayesian Classification NA Azeez, O Ademolu The Journal of Computer Science and its Applications. An International …, 2016 | 35 | 2016 |
Cyberbullying detection in social networks: Artificial intelligence approach NA Azeez, SO Idiakose, CJ Onyema, C Van Der Vyver Journal of Cyber Security and Mobility 10 (4), 745-774, 2021 | 33 | 2021 |
Threats to E-government implementation in the civil service: Nigeria as a case study KK Agbele, NA Azeez, AP Abidoye, AO Adesina, IM Venter, AS Oyewole The Pacific Journal of Science and Technology, 2012 | 29 | 2012 |
Deeply-learnt damped least-squares (DL-DLS) method for inverse kinematics of snake-like robots OM Omisore, S Han, L Ren, A Elazab, L Hui, T Abdelhamid, NA Azeez, ... Neural Networks 107, 34-47, 2018 | 27 | 2018 |
Towards ameliorating cybercrime and cybersecurity AN Ayofe, O Oluwaseyifunmitan International Journal of Computer Science and Information Security 3 (1), 1-11, 2009 | 26 | 2009 |
AANtID: an alternative approach to network intrusion detection NA Azeez, A Babatope The Journal of Computer Science and its Applications. An International …, 2016 | 25 | 2016 |
Empirical and Statistical Evaluation of the Effectiveness of Four Lossless Data Compression Algorithms NA Azeez, AA Lasisi Nigerian Journal of Technological Development (UNILORIN) 13 (2), 64-73, 2016 | 25 | 2016 |
A framework for computer aided investigation of ATM fraud in Nigeria NA Azeez, SB Adebayo, AR Ajetola, AF Abdulwahab International Journal of Soft Computing 5 (3), 78-82, 2010 | 25 | 2010 |
Implementation of a 4-tier cloud-based architecture for collaborative health care delivery NA Azeez, HD Iliyas Nigerian Journal of Technological Development (UNILORIN) 13 (1), 17-25, 2016 | 23 | 2016 |
A fuzzy expert system for diagnosing and analyzing human diseases NA Azeez, T Towolawi, C Van der Vyver, S Misra, A Adewumi, ... Innovations in Bio-Inspired Computing and Applications: Proceedings of the …, 2019 | 22 | 2019 |
Towards ensuring scalability, interoperability and efficient access control in a multi-domain grid-based environment NA Azeez, IM Venter SAIEE Africa Research Journal 104 (2), 54-68, 2013 | 22 | 2013 |