Suivre
Kayode Alese
Kayode Alese
Professor of Information and Cyber Security, The Federal University of Technology, Akure, Nigeria
Adresse e-mail validée de futa.edu.ng - Page d'accueil
Titre
Citée par
Citée par
Année
Network intrusion detection based on rough set and k-nearest neighbour
AO Adetunmbi, SO Falaki, OS Adewale, BK Alese
International Journal of Computing and ICT Research 2 (1), 60-66, 2008
1122008
Fingerprint image enhancement: Segmentation to thinning
GB Iwasokun, AO Charles, AB Kayode, O Olatubosun
International Journal of Advanced Computer Science and Applications 3 (1), 2012
992012
Development of a fuzzy logic based rainfall prediction model
AH Agboola, AJ Gabriel, EO Aliyu, BK Alese
International journal of Engineering and Technology 3 (4), 427-435, 2013
882013
Comparative analysis of public-key encryption schemes
BK Alese, ED Philemon, SO Falaki
International Journal of Engineering and Technology 2 (9), 1552-1568, 2012
872012
A computer-based security framework for crime prevention in Nigeria
GO Ogunleye, OS Adewale, BK Alese, AO Ogunde
A Paper presented at the 10th international conference of the Nigeria …, 2011
682011
Elliptic curve cryptography for securing cloud computing applications
OD Alowolodu, BK Alese, AO Adetunmbi, OS Adewale, OS Ogundele
International Journal of Computer Applications 66 (23), 2013
672013
Cloud application security using hybrid encryption
A Orobosade, TA Favour-Bethy, AB Kayode, AJ Gabriel
Communications on Applied Electronics 7 (33), 25-31, 2020
482020
Adaptive and faster approach to fingerprint minutiae extraction and validation
IG Babatunde, OC Akinyokun, AB Kayode, O Olatunbosun
International Journal of Computer Science and Security (IJCSS) 5 (4), 414-424, 2011
382011
A review of game theory approach to cyber security risk management
DA Akinwumi, GB Iwasokun, BK Alese, SA Oluwadare
Nigerian Journal of Technology 36 (4), 1271-1285, 2017
342017
Congestion analysis on the Nigerian global system for mobile communications (GSM) network
BM Kuboye, BK Alese, O Fajuyigbe
The Pacific Journal of Science and Technology 10 (1), 262-271, 2009
292009
Post-quantum crystography: a combination of post-quantum cryptography and steganography
AJ Gabriel, BK Alese, AO Adetunmbi, OS Adewale
8th International Conference for Internet Technology and Secured …, 2013
272013
Integrated E-Learning System (IES) for the Nigeria Universities: an architectural overview
OS Adeola, OS Adewale, BK Alese
American Journal of Database Theory and Application 2 (1), 1-8, 2013
272013
Risk analysis in cyber situation awareness using Bayesian approach
MA Bode, SA Oluwadare, BK Alese, AFB Thompson
2015 international conference on cyber situational awareness, data analytics …, 2015
242015
A web-based virtual classroom system model
OS Adewale, A Nıgerıa, EO Ibam, BK Alese
Turkish Online Journal of Distance Education 13 (1), 211-223, 2012
242012
Time series forecasting with neural network: a case study of stock prices of intercontinental bank nigeria
KG Akintola, BK Alese, AF Thompson
IJRRAS 3, 467-472, 2011
242011
Evaluating software quality attributes using analytic hierarchy process (AHP)
IB Botchway, AA Emmanuel, N Solomon, AB Kayode
International Journal of Advanced Computer Science and Applications 12 (3), 2021
212021
Post-quantum cryptography-driven security framework for cloud computing
HC Ukwuoma, G Arome, A Thompson, BK Alese
Open Computer Science 12 (1), 142-153, 2022
202022
Factor analytic approach to internet usage in South-Western Nigeria
BK Alese, SO Owoyemi
Journal of Information Technology Impact 4 (3), 171-188, 2004
202004
Development of models for managing network congestion on global system for mobile communication (GSM) in Nigeria
BM Kuboye, BK Alese, O Fajuyigbe, OS Adewale
Journal of Wireless Networking and Communications 1 (1), 8-15, 2011
182011
A data mining approach to network intrusion detection
AO Adetunmbi, BK Alese, OS Ogundele, SO Falaki
Journal of Computer Science & Its Applications 14 (2), 24-37, 2007
182007
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20