
Sunday Idowu- Professor
- Babcock University
Sunday Idowu
- Professor
- Babcock University
About
22
Publications
24,531
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
141
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (22)
One of the mainstream strategies identified for detecting Malicious Insider Threat (MIT) is building stacking ensemble Machine Learning (ML) models to reveal malevolent insider activities through anomalies in user activities. However, most anomalies found by these learning models were not malicious because MIT was treated as a single entity, wherea...
Component-Based Software Engineering (CBSE) research is an important emerging area of Software Engineering (SE) that supports and enhances evolution of reusable components useful for creation of software solutions. CBSE has assumptions that components exist in repositories, but this is usually not the case. That is, components are in want. The aim...
Hackers have devised a recent technique of infiltrating critical infrastructure with wanton applications that gulp at the limited resources possessed by these infrastructure for meeting critical needs and deadlines. Also a reality is the fact that hackers could breach already existing and trusted applications or
software on these critical infrastru...
Embedded software is a piece of software that is built in a system or hardware component to achieve an objective. Cyber-Physical Systems (CPS) are integrations of computation with physical processes which are monitored and controlled by the embedded systems. CPS has positively affected a number of application areas which include communication, cons...
The challenge of denial of service (DoS) attacks and its distributed (DDoS) variants have immensely clogged the pathway of growth and development of the Internet and its reliant technologies, as well as computing infrastructure in general. This type of attacks have gradually carved a niche for itself as one of the most obnoxious forms of attacks to...
The concepts of Object-Based Databases (OBD), Object-Oriented databases (OODB) and Object Relational Databases (ORDB) are of paramount importance in today's technological development. A comparison analysis of the concepts and usage of these variants of databases is presented in this paper with respect to areas of applications and features for more...
The turn of the 21st Century brought with it the Information Age. Over the years, Information Technology (IT) has evolved, producing a lot of breakthroughs in various sectors and bringing about the automation of various processes around the world,therebymaking life easier and more comfortable. It has brought about the sharing of information on a gl...
Computer performance is increasingly limited by the performance of memory systems due to the fact that the rate of memory system performance increase has lagged the rate of processor performance increase in the past years. In other to bridge this gap, the computer memory is methodically examined from the transistor level to the memory element (Flip...
The Internet has grown so much in importance and usage especially in the areas of web-based applications development and interconnectivity. Software developers have incredible opportunities by the advent of various hardware platforms such as the various servers and more recently various smart phones and pocket-size devices on which several web appl...
Cloud Computing is a constantly evolving IT generic term used to refer to various IT solutions and services provided via the internet. Precisely, cloud computing can be said to be the delivery of scalable IT resources over the Internet, as opposed to hosting and operating those resources locally; these resources can include applications and service...
There are many web-authoring software like FrontPage and Dreamweaver, which are being used to develop and maintain websites. These web-authoring software are becoming inadequate because websites are becoming more dynamic with different contents types. Content Management Systems (CMS) evolved as an alternative to such web-authoring tools because it...
There are many web-authoring software like FrontPage and Dreamweaver, which are being used to develop and maintain websites. These web-authoring software are becoming inadequate because websites are becoming more dynamic with different contents types. Content Management Systems (CMS) evolved as an alternative to such web-authoring tools because it...
The Internet has experienced a phenomenal growth as a result of increasing demands for contents, content distributions and other services. CDNs have evolved as cooperative and collaborative groups of networks over the Internet where contents are replicated over the surrogate servers for efficient delivery performance to the clients and improved ser...
Our world''s resources, and even the planet itself, are rapidly decaying faster than we can imagine. While many people debate the causes the effects are obvious to all: climate change, problem in the animal world, health problems and rising concern about sustainability. The question now is to what extent Information and Communication Technology (IC...
This paper reviews the use of mobile phones for delivering examination results via Short Messag- ing Service (SMS) in a university where student who have written examinations and are anxious to see their results need to get their grades in a convenient and accessible way, whether in the comfort of their homes, on the road, or while at work. At this...
The proliferation of e-learning systems in both lea rning institutions and companies has contrib- uted a lot to the acquisition and application of ne w skills. With the growth in technology, espe- cially the internet, e-learning systems are only ge tting better and having more impact on the users. This paper suggests an approach to e-learning that...
Ignoring security threats can have serious consequences; therefore host machines in network must continually be monitored for intrusions since they are the final endpoint of any network. As a result, this paper presents an Intelligent Intrusion Detection and Prevention System (IIDPS), which monitors a single host system from three different layers;...
In this paper, we present a way to bring information to students by leveraging the availability of phones (with SMS capability), especially cell phones. We review the use of mobile phones for delivering examination results via Short Messaging Service (SMS) in a university, where student who have written examinations and anxious to see their results...
The proliferation of e-leaming systems in both learning institutions and companies has contributed a lot to the acquisition and application of new skills. With the growth in technology, especially the internet, e-learning systems are only getting better and having more impact on the users. This paper suggests an approach to e-learning that emphasiz...