Genetic algorithm rule-based intrusion detection system (GAIDS) AA Ojugo, AO Eboka, O Okonta, R Yoro, F Aghware Journal of Emerging Trends in Computing and Information Sciences 3 (8), 1182 …, 2012 | 114 | 2012 |
Mitigating technical challenges via redesigning campus network for greater efficiency, scalability and robustness: A logical view AA Ojugo, AO Eboka International Journal of Modern Education and Computer Science 11 (6), 29, 2020 | 55 | 2020 |
Signature-based malware detection using approximate Boyer Moore string matching algorithm A Ojugo, AO Eboka International Journal of Mathematical Sciences and Computing 5 (3), 49-62, 2019 | 51 | 2019 |
A hybrid artificial neural network gravitational search algorithm for rainfall runoffs modeling and simulation in hydrology AA Ojugo, J Emudianughe, RE Yoro, EO Okonta, AO Eboka Prog Intell Comput Appl 2 (1), 22-33, 2013 | 51 | 2013 |
Hybrid model for early diabetes diagnosis AA Ojugo, AO Eboka, RE Yoro, MO Yerokun, FN Efozia 2015 Second International Conference on Mathematics and Computers in …, 2015 | 48 | 2015 |
Memetic algorithm for short messaging service spam filter using text normalization and semantic approach AA Ojugo, AO Eboka International Journal of Informatics and Communication Technology (IJ-ICT) 9 …, 2020 | 47 | 2020 |
Empirical Bayesian network to improve service delivery and performance dependability on a campus network AA Ojugo, AO Eboka IAES Int. J. Artif. Intell 10 (3), 623, 2021 | 43 | 2021 |
Assessing Users Satisfaction and Experience on Academic Websites: A Case of Selected Nigerian Universities Websites AA Ojugo, AO Eboka Int. J. Inf. Technol. Comput. Sci 10 (10), 53-61, 2018 | 40 | 2018 |
Comparative evaluation for high intelligent performance adaptive model for spam phishing detection AA Ojugo, AO Eboka Digital Technologies 3 (1), 9-15, 2018 | 39 | 2018 |
Quest for convergence solution using hybrid genetic algorithm trained neural network model for metamorphic malware detection AA Ojugo, CO Obruche, AO Eboka ARRUS Journal of Engineering and Technology 2 (1), 12-23, 2022 | 38 | 2022 |
Dependable community-cloud framework for smartphones AA Ojugo, FO Aghware, RE Yoro, MO Yerokun, AO Eboka, CN Anujeonye, ... American Journal of Networks and Communications 4 (4), 95, 2015 | 38 | 2015 |
Modeling the computational solution of market basket associative rule mining approaches using deep neural network AA Ojugo, AO Eboka Digital Technologies 3 (1), 1-8, 2018 | 36 | 2018 |
Framework Design for Statistical Fraud Detection AA Ojugo, AO Eboka, RE Yoro, MO Yerokun, FN Efozia Mathematics and Computers in Science and Enginerring, 2015 | 35 | 2015 |
Empirical Evaluation for Intelligent Predictive Models in Prediction of Potential Cancer Problematic Cases In Nigeria AA Ojugo, CO Obruche, AO Eboka ARRUS Journal of Mathematics and Applied Science 1 (2), 110-120, 2021 | 32 | 2021 |
Inventory prediction and management in Nigeria using market basket analysis associative rule mining: memetic algorithm based approach AA Ojugo, AO Eboka Int. J Inf & Commun Technol ISSN 2252 (8776), 8776, 2019 | 32 | 2019 |
Improved distribution and food safety for beef processing and management using a blockchain-tracer support framework AA Ojugo, PO Ejeh, CC Odiakaose, AO Eboka, FU Emordi Int. J. Informatics Commun. Technol 12 (3), 205, 2023 | 30 | 2023 |
A social engineering detection model for the mobile smartphone clients AA Ojugo, AO Eboka African Journal of Computing & ICT 7 (3), 91-100, 2014 | 28 | 2014 |
Effects of formative test and attitudinal types on students’ achievement in mathematics in Nigeria AA Ojugo, E Ugboh, CC Onochie, AO Eboka, MO Yerokun, IJB Iyawa African Educational Research Journal 1 (2), 113-117, 2013 | 28 | 2013 |
An Empirical Evaluation On Comparative Machine Learning Techniques For Detection of The Distributed Denial of Service (DDoS) Attacks A Ojugo, AO Eboka Journal of Applied Science, Engineering, Technology, and Education 2 (1), 18-27, 2020 | 27 | 2020 |
Technical issues for IP-based telephony in Nigeria AA Ojugo, R Abere, B Orhionkpaiyo, R Yoro, A Eboka Int. J. Wireless Comm. & Mobile Comp 1 (2), 58-67, 2013 | 24 | 2013 |