Follow
Oluwafemi Osho
Title
Cited by
Cited by
Year
A review on mobile SMS spam filtering techniques
MA Shafi’i, MS Abd Latiff, H Chiroma, O Osho, G Abdul-Salaam, ...
IEEE Access 5, 15650-15666, 2017
1012017
Comparative analysis of classification algorithms for email spam detection
SM Abdulhamid, M Shuaib, O Osho, I Ismaila, JK Alhassan
International Journal of Computer Network and Information Security 12 (1), 60, 2018
66*2018
National cyber security policy and strategy of Nigeria: a qualitative analysis
O Osho, AD Onoja
International Journal of Cyber Criminology 9 (1), 120, 2015
492015
Whale optimization algorithm-based email spam feature selection method using rotation forest algorithm for classification
M Shuaib, SM Abdulhamid, OS Adebayo, O Osho, I Idris, JK Alhassan, ...
SN Applied Sciences 1, 1-17, 2019
412019
Comparative evaluation of mobile forensic tools
O Osho, SO Ohida
IJ Inf. Technol. Comput. Sci 1, 74-83, 2016
272016
A survey of league championship algorithm: prospects and challenges
SM Abdulhamid, MSA Latiff, SHH Madni, O Oluwafemi
arXiv preprint arXiv:1603.09728, 2015
272015
Combating terrorism with cybersecurity: The Nigerian perspective
O Osho, AF Adeyinka, SM Abdulhamid
World Journal of Computer Application and Technology, 2013
252013
E-voting in Nigeria: A survey of voters' perception of security and other trust factors
O Osho, VL Yisa, OJ Jebutu
2015 International Conference on Cyberspace (CYBER-Abuja), 202-211, 2015
232015
Malware detection, supportive software agents and its classification schemes
OS Adebayo, MA Mabayoje, A Mishra, O Osho
International Journal of Network Security & Its Applications (IJNSA), 2012
222012
Forensic analysis of mobile banking apps
O Osho, UL Mohammed, NN Nimzing, AA Uduimoh, S Misra
Computational Science and Its Applications–ICCSA 2019: 19th International …, 2019
212019
E-Commerce in Nigeria: A Survey of Security Awareness of Customers and Factors that Influence Acceptance.
O Osho, CI Onuoha, JN Ugwu, AA Falaye
OcRI, 169-176, 2016
192016
Frameworks for mitigating identity theft and spamming through bulk messaging
O Osho, OY Ogunleke, AA Falaye
2014 IEEE 6th International Conference on Adaptive Science & Technology …, 2014
162014
Secure authentication for mobile banking using facial recognition
FA Adesuyi, O Oluwafemi, AI Oludare, AV Rick
IOSR Journal of Computer Engineering (IOSR-JCE), 2013
162013
Framework for an e-voting system applicable in developing economies
LO Osho, MB Abdullahi, O Osho
MECS, 2016
122016
AbsoluteSecure: a tri-layered data security system
O Osho, FA Musa, S Misra, AA Uduimoh, A Adewunmi, R Ahuja
International Conference on Information and Software Technologies, 243-255, 2019
102019
Comparative evaluation of techniques for detection of phishing URLs
O Osho, A Oluyomi, S Misra, R Ahuja, R Damasevicius, R Maskeliunas
Applied Informatics: Second International Conference, ICAI 2019, Madrid …, 2019
102019
Mobile spamming in Nigeria: An empirical survey
O Osho, VL Yisa, OY Ogunleke
2015 International Conference on Cyberspace (CYBER-Abuja), 150-159, 2015
102015
Forensic analysis of kik messenger on android devices
OS Adebayo, SA Sulaimon, O Osho, SM Abdulhamid
Second International Engineering Conference, Federal University of …, 2017
92017
Forensic analysis of mobile banking applications in Nigeria
AA Uduimoh, I Ismaila, O Osho, MA Shafi’i
i-manager's Journal on Mobile Applications and Technologies 6 (1), 9, 2019
72019
A Simple Encryption and Decryption System.
O Osho, YO Zubair, JA Ojeniyi
Isteam Research, 2014
72014
The system can't perform the operation now. Try again later.
Articles 1–20