Follow
Aborisade Dada. Olaniyi
Aborisade Dada. Olaniyi
Lecturer of Computer Science, Federal University of Agriculture, Abeokuta, Nigeria
Verified email at funaab.edu.ng
Title
Cited by
Cited by
Year
Application of fuzzy association rule mining for analysing students academic performance
OO Oladipupo, OJ Oyelade, DO Aborisade
International Journal of Computer Science Issues (IJCSI) 9 (6), 2012
82012
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016: Volume 2
Y Bi, S Kapoor, R Bhatia
Springer, 2017
62017
Selective harmonic elimination in multilevel inverter using real coded genetic algorithm initialized Newton Raphson method
IA Adeyemo, DO Aborisade, JA Ojo
International Journal of Engineering Research & Technology 2 (9), 3107-3113, 2013
52013
A survivability model for object-oriented software systems
AS Sodiya, DO Aborisade, AJ Ikuomola
2012 Fourth International Conference on Computational Aspects of Social …, 2012
52012
A real-time observation approach for assessing the impact of social media on students’ academic performance
S Agholor, AO Agholor, DO Aborisade
The Journal of Social Media in Society 9 (2), 214-235, 2020
32020
A Preferential Analysis of Existing Password Managers from End-Users’ View Point
S Agholor, AS Sodiya, AT Akinwale, OJ Adeniran, DO Aborisade
International Journal of Cyber-Security and Digital Forensics 5 (4), 187-196, 2016
22016
An Improved Cost-Sensitive Intrusion Response Model.
AJ Ikuomola, AS Sodiya, AT Akinwale, DO Aborisade
Journal of Information Assurance & Security 8 (3), 2013
22013
HierarchyMap: A Novel Approach to Treemap Visualization of Hierarchical Data
DO Aborisade, J Oyelade
Glob. J. Comput. Sci. Technol 5, 77-81, 2010
22010
Towards detecting credit card frauds using Hidden Markov Model
CO Tinubu, DO Aborisade, AS Sodiya, SA Onashoga, MA Ganiyu
Journal of Computer Science and Its Application 26 (2), 54-63, 2019
12019
Resolving DRDoS Attack in Cloud Database Service Using Common Source IP and Incremental Replacement Strategy
AD Olaniyi, R Christoph, SA Simon, AA Taofeek, BS Badmus
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016: Volume …, 2018
12018
L’accès des étudiants nigérians aux infrastructures des technologies de l’information
SA Simeon, AD Olaniyi, G Adegbuyi
Revue internationale d’éducation de Sèvres, 85-91, 2014
12014
A Cloud-based Password Manager for Multiple Transactions Accounts
DO Aborisade, OY Alowosile, KO Odunlami, A Odumosu
Proc. of 11th International Conference of Nigeria Computer Society, Iloko …, 2013
12013
Detecting ddos attacks in software defined networking
DO Aborisade, MK Kareem, SA Onashoga, CO Tinubu, S Agholor
1
A QR® Code Authentication Scheme for Signature Hiding
I OMOFAYE, SA Onashoga, DO Aborisade, BI Olajuwon
2023
Modeling recurrence of COVID-19 and its variants using recurrent neural network
JD Bolarinwa, OR Vincent, DO Aborisade, CA Adenusi, CO Ugwunna
Bulletin of Electrical Engineering and Informatics 12 (1), 380-386, 2023
2023
A Mathematical Model for Resolving Minimum Password Length Controversy
S Agholor, AS Sodiya, DO Aborisade
International Journal of Cyber-Security and Digital Forensics 7 (1), 1-10, 2018
2018
A Persuasive System for Influencing Mobile Phone Users’ Locking Behavior
S Agholor, DO Aborisade, A Onuodafin
Scientific and practical cyber security journal, 2018
2018
Call Response Rate As Baseline for Detecting DRDoS Attack in Cloud Database Service
DO Aborisade, C Reich, AS Sodiya, AT Akinwale
Software-Technologien und-Prozesse: Open-Source Software in der Industrie …, 2016
2016
A SURVIVABLE DISTRIBUTED DATABASE AGAINST BYZANTINE FAILURE
DO ABORISADE, AS SODIYA, AA ODUMOSU, OY ALOWOSILE, ...
Journal of Natural Sciences Engineering and Technology 15 (2), 61-72, 2016
2016
Digital Forensics System for Retrieving Contacts on Mobile Phones
DO Aborisade, OY Alowosile, AA Odumosu, AA Adedeji, O Odunayo
Proceedings of International Multidisciplinary and Interdisciplinary …, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20