Realtime fraud detection in the banking sector using data mining techniques/algorithm SN John, C Anele, OO Kennedy, F Olajide, CG Kennedy 2016 international conference on computational science and computational …, 2016 | 63 | 2016 |
Implementation of the enhanced fingerprint authentication in the ATM system using ATmega128 K Okokpujie, F Olajide, S John, CG Kennedy Proceedings of the international conference on security and management (SAM …, 2016 | 23 | 2016 |
Forensic live response and events reconstruction methods in linux systems F Olajide, N Savage, D Ndzi, H Al-Sinani PGNET The Convergence of Telecommunications Networking and Broadcasting …, 2009 | 17 | 2009 |
A Comparative study of Twofish, Blowfish, and advanced encryption standard for secured data transmission K Assa-Agyei, F Olajide International Journal of Advanced Computer Science and Applications 14 (3), 2023 | 14 | 2023 |
A technological approach towards the measurement of enterprise agility OC Williams, F Olajide 2020 15th Iberian Conference on Information Systems and Technologies (CISTI …, 2020 | 14 | 2020 |
Application level evidence from volatile memory F Olajide, N Savage Journal of Computing in Systems & Engineering 10, 171-175, 2009 | 13 | 2009 |
Developing a state of the art methodology & toolkit for ICS SCADA forensics F Olajide International Journal of Industrial Control Systems Security 1 (2), 44-56, 2016 | 11 | 2016 |
On the extraction of forensically relevant information from physical memory F Olajide, N Savage 2011 World Congress on Internet Security (WorldCIS-2011), 248-252, 2011 | 11 | 2011 |
Exploring process of information systems and information technology for enterprise agility O Williams, F Olajide, T Al-Hadhrami, A Lotfi Emerging Trends in Intelligent Computing and Informatics: Data Science …, 2020 | 8 | 2020 |
Power aware routing algorithms (PARA) in wireless mesh networks for emergency management T Al-Hadhrami, F Saeed, F Olajide PLoS One 13 (10), e0204751, 2018 | 8 | 2018 |
Towards the investigation of using social network analysis for counter terrorism in West Africa: case study of Boko Haram in Nigeria F Olajide, K Adeshakin journal of engineering science and technology 11 (11), 1629-1638, 2016 | 8 | 2016 |
Sequences of numbers obtained by digit and iterative digit sums of Sophie Germain primes and its variants SA Bishop, HI Okagbue, MO Adamu, FA Olajide Global Journal of Pure and Applied Mathematics 12 (2), 1473-1480, 2016 | 8 | 2016 |
Sensor network in automated hand hygiene systems using iot for public building MO Omoyibo, T Al-Hadhrami, F Olajide, A Lotfi, AM Elmisery Emerging Trends in Intelligent Computing and Informatics: Data Science …, 2020 | 7 | 2020 |
An experimental validation of public cloud mobile banking O Daramola, F Olajide, A Adewumi, C Ayo Research Journal of Applied Sciences, Engineering and Technology 7 (24 …, 2014 | 7 | 2014 |
Digital forensic research—The analysis of user input on volatile memory of Windows application F Olajide, N Savage, G Akmayeva, C Shoniregun World Congress on Internet Security (WorldCIS-2012), 231-238, 2012 | 7 | 2012 |
Forensic extraction of user information in continuous block of evidence F Olajide, N Savage International Conference on Information Society (i-Society 2011), 476-481, 2011 | 7 | 2011 |
On the investigation of social network analysis for E-commerce transaction in south-west region of Nigeria F Olajide, K Adeshakin, S Misra, CK Ayo International Journal of Pharmacy and Technology 8 (4), 23108-23114, 2016 | 6 | 2016 |
On some suggested applications of sudoku in information systems security F Olajide Asian Journal of Information Technology 14 (4), 117-121, 2015 | 6 | 2015 |
Towards the design of an intelligent automation framework for business processes OC Williams, F Olajide 2022 5th International Conference on Information and Computer Technologies …, 2022 | 5 | 2022 |
Identifying and finding forensic evidence from Windows application F Olajide, N Savage, G Akmayeva, C Shoniregun Journal of Internet Technology and Secured Transactions 1 (4), 117-122, 2012 | 5 | 2012 |