Oluwafemi Osho
Cited by
Cited by
A review on mobile SMS spam filtering techniques
MA Shafi’I, MS Abd Latiff, H Chiroma, O Osho, G Abdul-Salaam, ...
IEEE Access 5, 15650-15666, 2017
National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis
O Osho, AD Onoja
International Journal of Cyber Criminology 9 (1), 120-143, 2015
Combating Terrorism with Cybersecurity: The Nigerian Perspective
O Oluwafemi, FA Adesuyi, MA Shafi’i
World Journal of Computer Application and Technology 1 (4), 103-109, 2013
E-voting in Nigeria: A survey of voters' perception of security and other trust factors
O Osho, VL Yisa, OJ Jebutu
2015 International Conference on Cyberspace (CYBER-Abuja), 202-211, 2015
Comparative Evaluation of Mobile Forensic Tools
O Osho, SO Ohida
International Journal of Information Technology and Computer Science 8 (1 …, 2016
A Survey of League Championship Algorithm: Prospects and Challenges
SM Abdulhamid, MS Abd Latiff, SHH Madni, O Oluwafemi
Indian Journal of Science and Technology 8 (S3), 101 - 110, 2015
Malware detection, supportive software agents and its classification schemes
M MNCS, M MSAN, A Mishra
International Journal of Network Security & Its Applications 4 (6), 33, 2012
Comparative Analysis of Classification Algorithms for Email Spam Detection
SM Abdulhamid, M Shuaib, O Osho, I Ismaila, JK Alhassan
International Journal of Computer Network and Information Security 10 (1), 60-67, 2018
E-Commerce in Nigeria: A Survey of Security Awareness of Customers and Factors that Influence Acceptance
O Osho, CI Onuoha, JN Ugwu, AA Falaye
International Conference on Computing Research and Innovations (CoRI 2016 …, 2016
Secure Authentication for Mobile Banking Using Facial Recognition
FA Adesuyi, O Oluwafemi, AI Oludare, AN Victor, AV Rick
Framework for an E-Voting System Applicable in Developing Economies
LO Osho, MB Abdullahi, O Osho
International Journal of Information Engineering and Electronic Business 8 …, 2016
Frameworks for mitigating identity theft and spamming through bulk messaging
O Osho, OY Ogunleke, AA Falaye
2014 IEEE 6th International Conference on Adaptive Science & Technology …, 2014
Whale optimization algorithm-based email spam feature selection method using rotation forest algorithm for classification
M Shuaib, SM Abdulhamid, OS Adebayo, O Osho, I Idris, JK Alhassan, ...
SN Applied Sciences 1 (390), 2019
Mobile spamming in Nigeria: An empirical survey
O Osho, VL Yisa, OY Ogunleke
2015 International Conference on Cyberspace (CYBER-Abuja), 150-159, 2015
Forensic Analysis of Kik Messenger on Android Devices
OS Adebayo, SA Sulaimon, O Osho, SM Abdulhamid, JK Alhassan
2nd International Engineering Conference (IEC 2017), 2017
A Simple Encryption and Decryption System
O Osho, YO Zubair, JA Ojeniyi, LO Osho
Proceedings of the International Conference on Science, Technology …, 2014
A Metric in Global Software Development Environment.
LO Osho, S Misra, O Osho
Forensic Analysis of Mobile Banking Apps
O Osho, UL Mohammed, NN Nimzing, AA Uduimoh, S Misra
ICCSA 2019, Lecture Notes in Computer Science 11623, 613-626, 2019
Application of Geo-Location-Based Access Control in an Enterprise Environment
VL Yisa, B Meshach, O Osho, A Sule
International Journal of Computer Network and Information Security 10 (1), 36-43, 2018
Dynamics of SCADA System Malware: Impacts on Smart Grid Electricity Networks and Countermeasures
AA Falaye, O Osho, MI Emehian, S Ale
International Conference on Information and Communication Technology and Its …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20