Moving Target Defense Models and applications in cloud security
Applications Invited
3
Scholar Citations
1
Scholar h-index
RECENT SCHOLAR PUBLICATIONS
Phishing the Cyberspace: A Taxonomic Review of a decade-long cyber- pandemicOGB Orunsolu A. A., Sodiya A. S., Alaran M. A., Kareem S. O.International Journal of Information Security, Privacy on Digital Forensics 2021
Performance assessment of some phishing predictive models based on minimal feature corpusOGB Orunsolu Abiodun, Sodiya A. S., Kareem S. O.The Journal of Digital Forensics, Security and Law 16 (Article 5) 2021
RFID based Contactless Body Temperature Screening Device.OGBKSO Alaran M.A, Orunsolu A.A6th NIWIIT International Conference, Abuja 2021
E-commerce–a Tool for Economic, Infrastructure and Sustainable DevelopmentGB OladimejiTHE POLYMATH JOURNAL 5 (1), 12 2016
Use of legacy application software in critical academic environment - A time bombAAA Oladimeji G. B., Alaran M. A., Lawal O. A.Liberal Forum, Moshood Abiola Polytechnic 2016
MOST CITED SCHOLAR PUBLICATIONS
Performance assessment of some phishing predictive models based on minimal feature corpusOGB Orunsolu Abiodun, Sodiya A. S., Kareem S. O.The Journal of Digital Forensics, Security and Law 16 (Article 5) 2021Citations: 3