Follow
DR Joshua Ojo NEHINBE
Title
Cited by
Cited by
Year
A critical evaluation of datasets for investigating IDSs and IPSs researches
JO Nehinbe
2011 IEEE 10th international conference on cybernetic intelligent systems …, 2011
712011
A simple method for improving intrusion detections in corporate networks
JO Nehinbe
Information Security and Digital Forensics, 111-122, 2009
362009
Log Analyzer for Network Forensics and Incident Reporting
JO Nehinbe
2010 International Conference on Intelligent Systems, Modelling and …, 2010
352010
Methods for reducing workload during investigations of Intrusion Logs
JO Nehinbe
The University of Essex, 2011
122011
Automated method for reducing false positives
JO Nehinbe
2010 International Conference on Intelligent Systems, Modelling and …, 2010
122010
Security in Cyber‐Physical Systems: Foundations and Applications
MA Haque, S Shetty, K Gold, B Krishnappa, CA Lara-Nino, A Diaz-Perez, ...
Springer, 2021
112021
Automated technique for debugging network intrusion detection systems
JO Nehinbe
2010 International Conference on Intelligent Systems, Modelling and …, 2010
112010
A framework for collaborative, adaptive and cost sensitive intrusion response system
AJ Ikuomola, AS Sodiya, JO Nehinbe
2010 2nd Computer Science and Electronic Engineering Conference (CEEC), 1-4, 2010
82010
Emerging threats, risks and mitigation strategies in network forensics
JO Nehinbe
2011 24th Canadian Conference on Electrical and Computer Engineering (CCECE …, 2011
72011
Concurrent reduction of false positives and redundant alerts
JO Nehinbe
2010 International Conference on Information Society, 318-323, 2010
72010
An exhaustive study of DDOS attacks and DDOS datasets
JO Nehinbe, US Onyeabor
International Journal of Internet Technology and Secured Transactions …, 2018
62018
A review of technical issues on IDS and alerts
J Nehinbe
Global Journal of Computer Science and Technology 17 (5-E), 51-58, 2018
62018
Critical analyses of alerts swamping and intrusion redundancy
JO Nehinbe
2009 International Conference for Internet Technology and Secured …, 2009
52009
Security issues in sensor networks and gathering admissible evidence in network forensics
JO Nehinbe, P Damuut
2011 UKSim 5th European Symposium on Computer Modeling and Simulation, 394-399, 2011
42011
Guessing strategy for improving Intrusion Detections
JO Nehinbe
2010 2nd Computer Science and Electronic Engineering Conference (CEEC), 1-6, 2010
42010
A method for investigating distributed denial of service (DDoS) attacks
JO Nehinbe
Computer Science and Electronic Engineering Conference (CEEC 2009) 3, 2009
42009
A comparative study of attributes for gathering admissible evidence in the investigation of distributed denial of service (DDoS) attacks
JO Nehinbe
International Journal of Internet Technology and Secured Transactions 4 (2-3 …, 2012
32012
Optimised clustering method for reducing challenges of network forensics
JO Nehinbe
2010 2nd Computer Science and Electronic Engineering Conference (CEEC), 1-6, 2010
32010
Adaptive clustering method for reclassifying network intrusions
JO Nehinbe
Information Security and Digital Forensics, 135-146, 2010
3*2010
Statistical Methods for Conducting the Ontology and Classification of Fake News on Social Media
JO Nehinbe
Handbook of Research on Cyber Crime and Information Privacy 2, Chapter 29, 2020
22020
The system can't perform the operation now. Try again later.
Articles 1–20