A critical evaluation of datasets for investigating IDSs and IPSs researches JO Nehinbe 2011 IEEE 10th international conference on cybernetic intelligent systems …, 2011 | 71 | 2011 |
A simple method for improving intrusion detections in corporate networks JO Nehinbe Information Security and Digital Forensics, 111-122, 2009 | 36 | 2009 |
Log Analyzer for Network Forensics and Incident Reporting JO Nehinbe 2010 International Conference on Intelligent Systems, Modelling and …, 2010 | 35 | 2010 |
Methods for reducing workload during investigations of Intrusion Logs JO Nehinbe The University of Essex, 2011 | 12 | 2011 |
Automated method for reducing false positives JO Nehinbe 2010 International Conference on Intelligent Systems, Modelling and …, 2010 | 12 | 2010 |
Security in Cyber‐Physical Systems: Foundations and Applications MA Haque, S Shetty, K Gold, B Krishnappa, CA Lara-Nino, A Diaz-Perez, ... Springer, 2021 | 11 | 2021 |
Automated technique for debugging network intrusion detection systems JO Nehinbe 2010 International Conference on Intelligent Systems, Modelling and …, 2010 | 11 | 2010 |
A framework for collaborative, adaptive and cost sensitive intrusion response system AJ Ikuomola, AS Sodiya, JO Nehinbe 2010 2nd Computer Science and Electronic Engineering Conference (CEEC), 1-4, 2010 | 8 | 2010 |
Emerging threats, risks and mitigation strategies in network forensics JO Nehinbe 2011 24th Canadian Conference on Electrical and Computer Engineering (CCECE …, 2011 | 7 | 2011 |
Concurrent reduction of false positives and redundant alerts JO Nehinbe 2010 International Conference on Information Society, 318-323, 2010 | 7 | 2010 |
An exhaustive study of DDOS attacks and DDOS datasets JO Nehinbe, US Onyeabor International Journal of Internet Technology and Secured Transactions …, 2018 | 6 | 2018 |
A review of technical issues on IDS and alerts J Nehinbe Global Journal of Computer Science and Technology 17 (5-E), 51-58, 2018 | 6 | 2018 |
Critical analyses of alerts swamping and intrusion redundancy JO Nehinbe 2009 International Conference for Internet Technology and Secured …, 2009 | 5 | 2009 |
Security issues in sensor networks and gathering admissible evidence in network forensics JO Nehinbe, P Damuut 2011 UKSim 5th European Symposium on Computer Modeling and Simulation, 394-399, 2011 | 4 | 2011 |
Guessing strategy for improving Intrusion Detections JO Nehinbe 2010 2nd Computer Science and Electronic Engineering Conference (CEEC), 1-6, 2010 | 4 | 2010 |
A method for investigating distributed denial of service (DDoS) attacks JO Nehinbe Computer Science and Electronic Engineering Conference (CEEC 2009) 3, 2009 | 4 | 2009 |
A comparative study of attributes for gathering admissible evidence in the investigation of distributed denial of service (DDoS) attacks JO Nehinbe International Journal of Internet Technology and Secured Transactions 4 (2-3 …, 2012 | 3 | 2012 |
Optimised clustering method for reducing challenges of network forensics JO Nehinbe 2010 2nd Computer Science and Electronic Engineering Conference (CEEC), 1-6, 2010 | 3 | 2010 |
Adaptive clustering method for reclassifying network intrusions JO Nehinbe Information Security and Digital Forensics, 135-146, 2010 | 3* | 2010 |
Statistical Methods for Conducting the Ontology and Classification of Fake News on Social Media JO Nehinbe Handbook of Research on Cyber Crime and Information Privacy 2, Chapter 29, 2020 | 2 | 2020 |