A review on mobile SMS spam filtering techniques MA Shafi’i, MS Abd Latiff, H Chiroma, O Osho, G Abdul-Salaam, ... IEEE Access 5, 15650-15666, 2017 | 114 | 2017 |
Comparative analysis of classification algorithms for email spam detection SM Abdulhamid, M Shuaib, O Osho, I Ismaila, JK Alhassan International Journal of Computer Network and Information Security 12 (1), 60, 2018 | 68* | 2018 |
National cyber security policy and strategy of Nigeria: a qualitative analysis O Osho, AD Onoja International Journal of Cyber Criminology 9 (1), 120, 2015 | 53 | 2015 |
Whale optimization algorithm-based email spam feature selection method using rotation forest algorithm for classification M Shuaib, SM Abdulhamid, OS Adebayo, O Osho, I Idris, JK Alhassan, ... SN Applied Sciences 1, 1-17, 2019 | 42 | 2019 |
Comparative evaluation of mobile forensic tools O Osho, SO Ohida IJ Inf. Technol. Comput. Sci 1, 74-83, 2016 | 28 | 2016 |
A survey of league championship algorithm: prospects and challenges SM Abdulhamid, MSA Latiff, SHH Madni, O Oluwafemi arXiv preprint arXiv:1603.09728, 2015 | 27 | 2015 |
Forensic analysis of mobile banking apps O Osho, UL Mohammed, NN Nimzing, AA Uduimoh, S Misra Computational Science and Its Applications–ICCSA 2019: 19th International …, 2019 | 26 | 2019 |
Combating terrorism with cybersecurity: The Nigerian perspective O Osho, AF Adeyinka, SM Abdulhamid World Journal of Computer Application and Technology, 2013 | 25 | 2013 |
E-voting in Nigeria: A survey of voters' perception of security and other trust factors O Osho, VL Yisa, OJ Jebutu 2015 International Conference on Cyberspace (CYBER-Abuja), 202-211, 2015 | 23 | 2015 |
Malware detection, supportive software agents and its classification schemes OS Adebayo, MA Mabayoje, A Mishra, O Osho International Journal of Network Security & Its Applications (IJNSA), 2012 | 23 | 2012 |
E-Commerce in Nigeria: A Survey of Security Awareness of Customers and Factors that Influence Acceptance. O Osho, CI Onuoha, JN Ugwu, AA Falaye OcRI, 169-176, 2016 | 19 | 2016 |
Frameworks for mitigating identity theft and spamming through bulk messaging O Osho, OY Ogunleke, AA Falaye 2014 IEEE 6th International Conference on Adaptive Science & Technology …, 2014 | 16 | 2014 |
Secure authentication for mobile banking using facial recognition FA Adesuyi, O Oluwafemi, AI Oludare, AV Rick IOSR Journal of Computer Engineering (IOSR-JCE), 2013 | 16 | 2013 |
Framework for an e-voting system applicable in developing economies LO Osho, MB Abdullahi, O Osho MECS, 2016 | 12 | 2016 |
Comparative evaluation of techniques for detection of phishing URLs O Osho, A Oluyomi, S Misra, R Ahuja, R Damasevicius, R Maskeliunas Applied Informatics: Second International Conference, ICAI 2019, Madrid …, 2019 | 11 | 2019 |
AbsoluteSecure: a tri-layered data security system O Osho, FA Musa, S Misra, AA Uduimoh, A Adewunmi, R Ahuja International Conference on Information and Software Technologies, 243-255, 2019 | 10 | 2019 |
Mobile spamming in Nigeria: An empirical survey O Osho, VL Yisa, OY Ogunleke 2015 International Conference on Cyberspace (CYBER-Abuja), 150-159, 2015 | 10 | 2015 |
Forensic analysis of kik messenger on android devices OS Adebayo, SA Sulaimon, O Osho, SM Abdulhamid Second International Engineering Conference, Federal University of …, 2017 | 9 | 2017 |
Forensic analysis of mobile banking applications in Nigeria AA Uduimoh, I Ismaila, O Osho, MA Shafi’i i-manager's Journal on Mobile Applications and Technologies 6 (1), 9, 2019 | 7 | 2019 |
Application of geo-location-based access control in an enterprise environment LV Yisa, O Osho, A Sule IJ Computer Network and Information Security, 2018 | 7 | 2018 |