default search action
Nureni Ayofe Azeez
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j11]Nureni Ayofe Azeez, Sanjay Misra, Davidson Onyinye Ogaraku, Ademola Philip Abidoye:
A Predictive Model for Benchmarking the Performance of Algorithms for Fake and Counterfeit News Classification in Global Networks. Sensors 24(17): 5817 (2024) - 2023
- [j10]Nureni Ayofe Azeez, Odejinmi Oluwatobi Samuel:
A cyberstalking-free global network with artificial intelligence approach. Int. J. Inf. Comput. Secur. 21(1/2): 82-108 (2023) - 2022
- [j9]Nureni Ayofe Azeez, Ogunlusi E. Victor, Sanjay Misra, Robertas Damasevicius, Rytis Maskeliunas:
Extracted rule-based technique for anomaly detection in a global network. Int. J. Electron. Secur. Digit. Forensics 14(6): 616-637 (2022) - 2021
- [j8]Nureni Ayofe Azeez, Sanjay Misra, Ihotu Agbo Margaret, Luis Fernández Sanz, Shafii Muhammad Abdulhamid:
Adopting automated whitelist approach for detecting phishing attacks. Comput. Secur. 108: 102328 (2021) - [j7]Nureni Ayofe Azeez, Oluwanifise Ebunoluwa Odufuwa, Sanjay Misra, Jonathan Oluranti, Robertas Damasevicius:
Windows PE Malware Detection Using Ensemble Learning. Informatics 8(1): 10 (2021) - [j6]Nureni Ayofe Azeez, Sanjay Misra, Omotola Ifeoluwa Lawal, Jonathan Oluranti:
Identification and Detection of Cyberbullying on Facebook Using Machine Learning Algorithms. J. Cases Inf. Technol. 23(4): 1-21 (2021) - 2020
- [j5]Nureni Ayofe Azeez, Balikis Bolanle Salaudeen, Sanjay Misra, Robertas Damasevicius, Rytis Maskeliunas:
Identifying phishing attacks in communication networks using URL consistency features. Int. J. Electron. Secur. Digit. Forensics 12(2): 200-213 (2020) - 2019
- [j4]Nureni Ayofe Azeez, Tolulope Jide Ayemobola, Sanjay Misra, Rytis Maskeliunas, Robertas Damasevicius:
Network Intrusion Detection with a Hashing Based Apriori Algorithm Using Hadoop MapReduce. Comput. 8(4): 86 (2019) - 2018
- [j3]Olatunji Mumini Omisore, Shipeng Han, Lingxue Ren, Ahmed Elazab, Hui Li, Talaat Abdelhamid, Nureni Ayofe Azeez, Lei Wang:
Deeply-learnt damped least-squares (DL-DLS) method for inverse kinematics of snake-like robots. Neural Networks 107: 34-47 (2018) - 2011
- [j2]Ademola Philip Abidoye, Nureni Ayofe Azeez, Ademola O. Adesina, Kehinde Kayode Agbele, Henry O. Nyongesa:
Using Wearable Sensors for Remote Healthcare Monitoring System. J. Sens. Technol. 1(2): 22-28 (2011) - [j1]Ademola Philip Abidoye, Nureni Ayofe Azeez, Ademola O. Adesina, Kehinde Kayode Agbele:
ANCAEE: A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks. Wirel. Sens. Netw. 3(9): 307-312 (2011)
Conference and Workshop Papers
- 2018
- [c4]Nureni Ayofe Azeez, Timothy Towolawi, Charles Van der Vyver, Sanjay Misra, Adewole Adewumi, Robertas Damasevicius, Ravin Ahuja:
A Fuzzy Expert System for Diagnosing and Analyzing Human Diseases. IBICA 2018: 474-484 - [c3]Nureni Ayofe Azeez, Samuel O. Oyeniran, Charles Van der Vyver, Sanjay Misra, Ravin Ahuja, Robertas Damasevicius, Rytis Maskeliunas:
Diagnosing Oral Ulcers with Bayes Model. IBICA 2018: 485-494 - 2012
- [c2]Nureni Ayofe Azeez, Isabella Margarethe Venter:
Towards achieving scalability and interoperability in a triple-domain grid-based environment (3DGBE). ISSA 2012: 1-10 - 2011
- [c1]Nureni Ayofe Azeez, Tiko Iyamu, Isabella Margarethe Venter:
Grid Security Loopholes with Proposed Countermeasures. ISCIS 2011: 411-418
Informal and Other Publications
- 2023
- [i3]Ademola Philip Abidoye, Ibidun Christiana Obagbuwa, Nureni Ayofe Azeez:
Mitigating Denial of Service Attacks in Fog-Based Wireless Sensor Networks Using Machine Learning Techniques. CoRR abs/2310.05952 (2023) - 2009
- [i2]Azeez Nureni Ayofe, Osunade Oluwaseyifunmitan:
Approach To Solving Cybercrime And Cybersecurity. CoRR abs/0908.0099 (2009) - [i1]Azeez Nureni Ayofe, Azeez Raheem Ajetola:
Exploration of the Gap Between Computer Science Curriculum and Industrial I.T Skills Requirements. CoRR abs/0908.4353 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint