Search Results - "Sodiya, A.S."

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    A predictive model for phishing detection by Orunsolu, A.A., Sodiya, A.S., Akinwale, A.T.

    “…Nowadays, many anti-phishing systems are being developed to identify phishing contents in online communication systems. Despite the availability of myriads…”
    Get full text
    Journal Article
  2. 2

    LINKCALCULATOR – AN EFFICIENT LINK-BASED PHISHING DETECTION TOOL by Abiodun, Orunsolu, A.S, Sodiya, S.O, Kareem

    Published in Acta informatica Malaysia (02-10-2020)
    “…The problem of phishing attacks continues to demand new solutions as existing solutions are limited by various challenges such as high computational…”
    Get full text
    Journal Article
  3. 3

    A partition enhanced mining algorithm for distributed association rule mining systems by Ogunde, A.O., Folorunso, O., Sodiya, A.S.

    Published in Egyptian informatics journal (01-11-2015)
    “…The extraction of patterns and rules from large distributed databases through existing Distributed Association Rule Mining (DARM) systems is still faced with…”
    Get full text
    Journal Article
  4. 4

    Performance Assessment of some Phishing predictive models based on Minimal Feature corpus by Abdul Abiodun, Orunsolu, A.S, Sodiya, S.O, Kareem, B, Oladimeji G.

    “…The credentials harvested normally include bank account numbers, passwords or PINs, credit card numbers, security questions, security codes etc. In most…”
    Get full text
    Journal Article
  5. 5

    An improved two-tiered strategy to intrusion detection by Sodiya, A.S, Longe, H.O.D

    Published in Information management & computer security (01-07-2005)
    “…Purpose - A work that combined strategies in designing anomaly-based instruction detection system (IDS) was described in CSIDS. This new work seeks to improve…”
    Get full text
    Journal Article
  6. 6

    A new two-tiered strategy to intrusion detection by Sodiya, A.S, Longe, H.O.D, Akinwale, A.T

    “…Researchers have used many techniques in designing intrusion detection systems (IDS) and yet we still do not have an effective IDS. The interest in this work…”
    Get full text
    Journal Article
  7. 7

    Maintaining privacy in anomaly-based intrusion detection systems by Sodiya, A.S, Longe, H.O.D, Akinwale, A.T

    “…Purpose - The goal of our work is to discuss the fundamental issues of privacy and anomaly-based intrusion detection systems (IDS) and to design an efficient…”
    Get full text
    Journal Article
  8. 8

    An improved twotiered strategy to intrusion detection by Sodiya, A.S., Longe, H.O.D.

    Published in Information management & computer security (01-07-2005)
    “…Purpose A work that combined strategies in designing anomalybased instruction detection system IDS was described in CSIDS. This new work seeks to improve on…”
    Get full text
    Journal Article
  9. 9

    Maintaining privacy in anomalybased intrusion detection systems by Sodiya, A.S., Longe, H.O.D., Akinwale, A.T.

    Published in Information management & computer security (01-02-2005)
    “…Purpose The goal of our work is to discuss the fundamental issues of privacy and anomalybased intrusion detection systems IDS and to design an efficient…”
    Get full text
    Journal Article
  10. 10

    A new twotiered strategy to intrusion detection by Sodiya, A.S., Longe, H.O.D., Akinwale, A.T.

    Published in Information management & computer security (01-02-2004)
    “…Researchers have used many techniques in designing intrusion detection systems IDS and yet we still do not have an effective IDS. The interest in this work is…”
    Get full text
    Journal Article