Electronic Voting: A Panacea for electoral irregularities in developing countries AJ Jegede, GI Aimufua, NI Akosu Internaltional J. Sci. Knowl 1, 17-37, 2012 | 15 | 2012 |
Trends and future directions in automated ransomware detection A Jegede, A Fadele, M Onoja, G Aimufua, IJ Mazadu Journal of Computing and Social Informatics 1 (2), 17-41, 2022 | 12 | 2022 |
cancelable and hybrid biometric cryptosystems : current directions and open research issues RM Abayomi Jegede, Nur Izura Udzir , Azizol Abdullah International Journal of Advanced and Applied Sciences 4 (11), 65-77, 2017 | 11 | 2017 |
State of the Art in Biometric Key Binding and Key Generation Schemes A Jegede, NI Udzir, A Abdullah, R Mahmod International Journal of Communication Networks and Information Security …, 2017 | 8 | 2017 |
Revocable and Non Invertible Multibiometric Template Protection Based on Matrix Transformation RM Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah Pertanika Journal of Science and Technology 26 (1), 133-160, 2018 | 7 | 2018 |
Ransomware attacks on remote learning systems in 21st century: a survey FA Alaba, A Jegede Biomed J Sci Tech Res 35 (1), 2021 | 6 | 2021 |
Face recognition and template protection with shielding function A Jegede, NI Udzir, A Abdullah, R Mahmod International Journal of Security and Its Applications, 2015 | 5 | 2015 |
Exploring the effectiveness and efficiency of LightGBM algorithm for windows malware detection M Onoja, A Jegede, J Mazadu, G Aimufua, A Oyedele, K Olibodum 2022 5th Information Technology for Education and Development (ITED), 1-6, 2022 | 4 | 2022 |
EEMDS: Efficient and effective malware detection system with hybrid model based on xceptioncnn and lightgbm algorithm M Onoja, A Jegede, N Blamah, OV Abimbola, TO Omotehinwa Journal of Computing and Social Informatics 1 (2), 42-57, 2022 | 4 | 2022 |
Information Security Policy: Relevance, Creation and Enforce-ment AJ Jegede, GIO Aimufua, HO Salami International Journal of Soft Computing 2 (3), 408-410, 2007 | 4 | 2007 |
Assessment of security awareness level of mobile device users in tertiary institutions in plateau state of nigeria A Jegede, G Odii, M Magaji, G Aimufua Journal of Advanced Computing Technology and Application (JACTA) 3 (2), 1-8, 2021 | 3 | 2021 |
A prototype of an automated farm monitoring system A Jegede, G Shanding, G Thomas | 2 | 2021 |
A secure and privacy preserving iris biometric authentication scheme with matrix transformation A Jegede, NI Udzir, A Abdullah, R Mahmod Information Security Applications: 17th International Workshop, WISA 2016 …, 2017 | 2 | 2017 |
Artificial Intelligence of Things (AIoT) Solutions for Sustainable Agriculture and Food Security FA Alaba, A Jegede, U Sani, EG Dada Artificial Intelligence of Things for Achieving Sustainable Development …, 2024 | 1 | 2024 |
Mobile Privacy Awareness of Higher Education Students in Plateau State Nigeria A Jegede, CA Chagga, G Aimufua, J Mazadu, A Oloyede, K Olubodun Jurnal Transformatika 20 (2), 119, 2023 | 1 | 2023 |
Computer modelling and simulation for inventory control GK Adegoke, GIO Aimufua, AJ Jegede Research Journal of Applied Sciences, Engineering and Technology, 2012 | 1 | 2012 |
A Specification of an Application Gateway for Client/Server Systems AJ Jegede, GIO Aimufua, HO Salami Asian I. Inform. Technol 6, 847-853, 2007 | 1 | 2007 |
Towards Building an Improved Malware Detection System: Investigating the LightGBM Model O Monday, M Homola, A Jegede BOOK OF ABSTRACTS, 7, 2024 | | 2024 |
IMPLEMENTATION OF A MITIGATION STRATEGY FOR DENIAL OF SLEEP ATTACK AT NETWORK ORGANIZATION LEVEL IN WIRELESS SENSOR NETWORKS M Shua'ibu, IR Saidu, A Jegede, A Oloyede, M Magaji, J Mazadu Journal of Advanced Computing Technology and Application (JACTA), 13-32, 2022 | | 2022 |
Fast Tree Model for Predicting Network Security Incidents MM Magaji, A Jegede, NY Gurumdimma, M Onoja, G Aimufua, A Oloyede 2022 5th Information Technology for Education and Development (ITED), 1-6, 2022 | | 2022 |