Oreoluwa Adesegun

Oreoluwa Adesegun
Babcock University · Computer Science

PhD

About

10
Publications
6,504
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
11
Citations
Citations since 2016
4 Research Items
10 Citations
2016201720182019202020212022012345
2016201720182019202020212022012345
2016201720182019202020212022012345
2016201720182019202020212022012345

Publications

Publications (10)
Article
Association rule mining (ARM) is an aspect of data mining that has revolutionized the area of predictive modelling paving way for data mining technique to become the recommended method for business owners to evaluate organizational performance. Market basket analysis (MBA), a useful modeling technique in data mining, is often used to analyze custom...
Article
Full-text available
Disease outbreak forecasting, provides warning that a certain amount of disease may occur at a particular time in the future. This research work uses measles, which is a highly contagious disease caused by the measles virus, "Morbillivirus" as a case study. It has been problematic detecting the outbreaks of measles, which leads to high childhood mo...
Article
Full-text available
The challenge of denial of service (DoS) attacks and its distributed (DDoS) variants have immensely clogged the pathway of growth and development of the Internet and its reliant technologies, as well as computing infrastructure in general. This type of attacks have gradually carved a niche for itself as one of the most obnoxious forms of attacks to...
Article
Full-text available
Known obfuscation techniques and other methods discovered by other researches such as Desai and Stamp (2010), Mohan & Hamlem(2012) have made detection of malware more difficult. This research is positioned to reviewing the current practices in the antivirus industry and determining if malware signature databases are adequate in detecting metamorphi...
Article
Full-text available
Radio Frequency Identification Detection technology (RFID) is a convenient and automatic instrument of identification and detection. It's application can be extended to cellular network. Cellular network is a form of radio technology that makes used of radio waves for its functionality. It major goal is to cover a larger geographical area without t...
Data
Full-text available
Radio Frequency Identification technology (RFID) is a convenient and automatic instrument of identification and detection. However, it has been identified with some challenges despite its prospects. The need to mitigate collision among multiple readers and tags is of importance for effective deployment of the technology. The paper aimed at reviewin...
Article
Full-text available
Communication is the interaction between two or more entities. Over the years, many communication systems have emerged both in the area of wired and wireless communication. For an effective communication, the components that make up the communication system must be reliable. For a mobile communication to be achieved, radio transmission techniques h...
Conference Paper
Full-text available
Research has shown that social engineering attack is a form of attack that leverages on human mind or emotional desires in order to fortify their attacking strategy. Over the years, industries/organizations have devised several means of thwarting the technological based attacks but this form of partially non-technological base attack has been a cha...

Network

Cited By

Projects

Project (1)
Project
To build epistemology as relates to the most essential constituents in Cybersecurity Research... Creating an guide for the beginning Cybersecurity / Information Security Researcher...