A systematic review of computational thinking approach for programming education in higher education institutions FJ Agbo, SS Oyelere, J Suhonen, S Adewumi Proceedings of the 19th Koli Calling International Conference on Computing …, 2019 | 89 | 2019 |
Review on insider threat detection techniques TO Oladimeji, CK Ayo, SE Adewumi Journal of Physics: Conference Series 1299 (1), 012046, 2019 | 24 | 2019 |
Securing industrial control system environments: the missing piece UD Ani, N Daniel, F Oladipo, SE Adewumi Journal of Cyber Security Technology 2 (3-4), 131-163, 2018 | 16 | 2018 |
An Ideal ATM Implementation in an Unsecured Enviroment S Adewumi Covenant University, 2010 | 9 | 2010 |
Diagnosing Salem University Lokoja Network for Better Network Performance O Ugochukwu, DK Aristarkus, SE Adewumi Universal Journal of Communications and Network 2 (2), 40-46, 2014 | 7 | 2014 |
The eLearning fellowship program at the University of Jos, Nigeria SE Adewumi, J Dooga, DCJ Dakas, DI Yakmut, TJ Mafwil Distance Education 32 (2), 261-268, 2011 | 7 | 2011 |
Evaluating industrial control system (ICS) security vulnerability through functional dependency analysis UD Ani, NC Daniel, SE Adewumi Journal of Computer Science and Its Application 25 (1), 73-89, 2018 | 5 | 2018 |
Text compression algorithm: A new approach SE Adewumi, EJD Garba | 5 | 2010 |
A new text compression algorithm SE Adewumi, EJD Garba EUROPEAN JOURNAL OF SCIENTIFIC RESEARCH, 2005 | 5 | 2005 |
Insider threat detection using binary classification algorithms TO Oladimeji, CK Ayo, SE Adewumi IOP Conference Series: Materials Science and Engineering 1107 (1), 012031, 2021 | 4 | 2021 |
Internet capabilities for effective learning and research UPD Ani, K Taiwo, E Ogbuju, SE Adewumi International Journal of Innovation and Scientific Research 13 (1), 341-348, 2015 | 4 | 2015 |
A cryptosystems algorithm using systems of non-linear Equations SE Adewumi, EJD Garba International Journal of Information Science and Management (IJISM) 1 (1), 43-55, 2003 | 4 | 2003 |
Character Analysis Scheme for Compressing Text Files SE Adewumi International Journal of Computer Theory and Engineering 7 (5), 362-365, 2015 | 3 | 2015 |
An optimal scheme for compressing text documents SE Adewumi, EJD Garba | 3 | 2010 |
An algorithm for encrypting messages using matrix inversion SE Adewumi, EJD Garba Science World Journal 2 (4), 2007 | 3 | 2007 |
Computer Viruses: A Framework for Modeling Infection Susceptibility of Workstations FJ Agbo, SE Adewumi, I Olalekan, K Sunday Journal of Advances in Computer Science and Engineering 14 (2), 97-109, 2015 | 2 | 2015 |
Index sort algorithm for positive integers SE Adewumi Science World Journal 3 (3), 2008 | 2 | 2008 |
Securing Electronic Funds and Transfer Against Plaintext Attacks SE Adewumi, EJ Garba The Journal of Information, Communication and Computing Technology, EBSU …, 2006 | 2 | 2006 |
Computer Virus: Africa’s Fifth Enemy SE Adewumi A paper presented at the 3 rd International Conference on Information …, 2004 | 2 | 2004 |
Securing Transborder Messages: An Encryption Standard for developing countries SE Adewumi, EJD Garba Proceeding of the Fourth Annual Global Information Technology Management …, 2003 | 2 | 2003 |