Genetic algorithm rule-based intrusion detection system (GAIDS) AA Ojugo, AO Eboka, O Okonta, R Yoro, F Aghware Journal of Emerging Trends in Computing and Information Sciences 3 (8), 1182 …, 2012 | 113 | 2012 |
Forging a deep learning neural network intrusion detection framework to curb the distributed denial of service attack AA Ojugo, RE Yoro International Journal of Electrical and Computer Engineering 11 (2), 1498, 2021 | 57 | 2021 |
Hybrid model for early diabetes diagnosis AA Ojugo, AO Eboka, RE Yoro, MO Yerokun, FN Efozia 2015 Second International Conference on Mathematics and Computers in …, 2015 | 52 | 2015 |
A hybrid artificial neural network gravitational search algorithm for rainfall runoffs modeling and simulation in hydrology AA Ojugo, J Emudianughe, RE Yoro, EO Okonta, AO Eboka Prog Intell Comput Appl 2 (1), 22-33, 2013 | 52 | 2013 |
Evidence of personality traits on phishing attack menace among selected university undergraduates in Nigerian RE Yoro, FO Aghware, MI Akazue, AE Ibor, AA Ojugo International Journal of Electrical and Computer Engineering 13 (2), 1943, 2023 | 50 | 2023 |
Improved services traceability and management of a food value chain using block-chain network: a case of Nigeria MI Akazue, RE Yoro, BO Malasowe, O Nwankwo, AA Ojugo Indonesian Journal of Electrical Engineering and Computer Science 29 (3 …, 2023 | 49 | 2023 |
Assessing contributor features to phishing susceptibility amongst students of petroleum resources varsity in Nigeria RE Yoro, FO Aghware, BO Malasowe, O Nwankwo, AA Ojugo Int. J. Electr. Comput. Eng 13 (2), 1922, 2023 | 45 | 2023 |
Empirical evidence of phishing menace among undergraduate smartphone users in selected universities in Nigeria MI Akazue, AA Ojugo, RE Yoro, BO Malasowe, O Nwankwo Indonesian Journal of Electrical Engineering and Computer Science 28 (3 …, 2022 | 44 | 2022 |
Predicting Futures price and contract portfolios using the ARIMA model: a case of Nigeria’s Bonny light and forcados AA Ojugo, RE Yoro Quantitative Economics and Management Studies 1 (4), 237-248, 2020 | 40 | 2020 |
Sentiment analysis in detecting sophistication and degradation cues in malicious web contents FO Aghware, RE Yoro, PO Ejeh, CC Odiakaose, FU Emordi, AA Ojugo Kongzhi yu Juece/Control Decis 38 (01), 653-665, 2023 | 39 | 2023 |
Extending the three-tier constructivist learning model for alternative delivery: ahead the COVID-19 pandemic in Nigeria AA Ojugo, RE Yoro Indonesian Journal of Electrical Engineering and Computer Science 21 (3), 1673, 2021 | 39 | 2021 |
DeLClustE: Protecting Users from Credit-Card Fraud Transaction via the Deep-Learning Cluster Ensemble FO Aghware, RE Yoro, PO Ejeh, CC Odiakaose, FU Emordi, AA Ojugo International Journal of Advanced Computer Science and Applications 14 (6), 2023 | 38 | 2023 |
Dependable community-cloud framework for smartphones AA Ojugo, FO Aghware, RE Yoro, MO Yerokun, AO Eboka, CN Anujeonye, ... American Journal of Networks and Communications 4 (4), 95-103, 2015 | 37 | 2015 |
Computational intelligence in stochastic solution for Toroidal Queen AA Ojugo, R Yoro Progress in Intelligence Computing and Applications 2 (1), 46-56, 2013 | 37 | 2013 |
Framework design for statistical fraud detection AA Ojugo, AO Eboka, RE Yoro, MO Yerokun, FN Efozia Mathematics and Computers in Sciences and Engineering Series 50, 176-182, 2015 | 36 | 2015 |
An Intelligent Model Using Relationship in Weather Conditions to Predict Livestock-Fish Farming Yield and Production in Nigeria RE Yoro, AA Ojugo American Journal of Modeling and Optimization 7 (2), 35-41, 2019 | 30 | 2019 |
Immunization problem for Ebola virus in rural Sierra-Leone AA Ojugo, D Oyemade, D Allenotor, RE Yoro, CN Anujeonye African J. of Comp. & ICT 8 (1), 2015 | 25 | 2015 |
Technical issues for IP-based telephony in Nigeria AA Ojugo, R Abere, B Orhionkpaiyo, R Yoro, A Eboka Int. J. Wireless Comm. & Mobile Comp 1 (2), 58-67, 2013 | 24 | 2013 |
Robust cellular network rural telephony in Southern Nigeria AA Ojugo, RE Yoro, DA Oyemade, AO Eboka, E Ugboh, F Aghware American Journal of Networks and Communications 2 (5), 125, 2013 | 23 | 2013 |
Empirical solution for an optimized machine learning framework for anomaly-based network intrusion detection AA Ojugo, RE Yoro Technology Report of Kansai University 62 (08), 6353-6364, 2020 | 21 | 2020 |