Evaluating advanced persistent threats mitigation effects: a review OI Adelaiye, A Showole, SA Faki International Journal of Information Security Science 7 (4), 159-171, 2018 | 17 | 2018 |
Cryptosystem for Secure Data Transmission using Advance Encryption Standard (AES) and Steganography MM Yahaya, A Ajibola International Journal of Sci-entific Research in Computer Science …, 2019 | 14 | 2019 |
Layered approach to open source software development success A Showole, S Sahibuddin, S Ibrahim Communications of the IBIMA, 2011 | 9 | 2011 |
Mining Complex Spatial Patterns: Issues and Techniques GL Samson, J Lu, AA Showole Journal of Information & Knowledge Management 13 (02), 1450019, 2014 | 7 | 2014 |
Artefact-based approach for improving social presence in e-learning NA Rahman, R Mohamad, A Showole International Journal of Innovation and Learning 25 (4), 412-429, 2019 | 6 | 2019 |
Large Spatial Database Indexing with aX-tree G Samson, L Joan, MM Usman, AA Showole, HJ Hadeel International Journal of Scientific Research in Computer Science …, 2018 | 6 | 2018 |
Feature selection: It importance in performance prediction MM Usman, O Owolabi, AA Ajibola IJESC, 2020 | 4 | 2020 |
Effect Of Ict On Agricultural Sector In Nigeria A Showole, B Hashim Academ Arena 6 (5), 16-24, 2014 | 4 | 2014 |
Emerging Issues In Mobile Phone Service Providers’ Promotional Messages In Nigeria A Showole, BH Ibrahim Researcher 6 (3), 21-26, 2014 | 3 | 2014 |
Industrial Application Development with Open Source Approach A Showole, S Ibrahim, S Sahibuddin The Third International Conference on Software Engineering Advances, 2008 | 3 | 2008 |
Open Source Quality Assurance Process SA Aminat, HOD Longe Conference Proceedings, Nigeria Computing Society (NCS) Vol 17, 172-181, 2006 | 3 | 2006 |
Improved detection of advanced persistent threats using an anomaly detection ensemble approach AO Ishaya, A Aminat, B Hashim, AA Adekunle Adv Sci Technol Eng Syst J 6 (2), 295-302, 2021 | 2 | 2021 |
Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. A Ajibola, I Ujata, O Adelaiye, NA Rahman International Journal of Information Security & Cybercrime 8 (2), 2019 | 2 | 2019 |
Open Source Integration into Business Strategies: A Review S Aminat, A Selamat, S Sahibudin Commun IBIMA 2 (17), 122-128, 2008 | 2 | 2008 |
Cyber Security Framework for Nigerian Civil Aviation Authority, Headquarters RN Anaedevha, A Ajibola International Journal of, 2020 | 1 | 2020 |
Intrusion Detection System Using Comparative Machine Learning Algorithms IF Ejimofor, AA Ajibola, U Igboeli, MA Yakubu | 1 | 2020 |
Mitigating Advanced Persistent Threats Using A Combined Static-Rule And Machine Learning-Based Technique O Adelaiye, A Ajibola 2019 15th International Conference on Electronics, Computer and Computation …, 2019 | 1 | 2019 |
The Effect of ICT on Federal Radio Cooperation of Nigeria AA Showole, G Samson, MM Usman, A Atumoshi European Journal of Academic Essays 2 (3), 47-59, 2015 | 1 | 2015 |
AN ONION PROCESS MODEL TO SUPPORT OPEN SOURCE DEVELOPMENT AA Showole Universiti Teknologi Malaysia, 2011 | 1 | 2011 |
A Domain-Specific Search Engine: A Case of University of Abuja YM Sanusi, A Ajibola International Journal of Advances in Scientific Research and Engineering …, 2019 | | 2019 |