Realtime fraud detection in the banking sector using data mining techniques/algorithm SN John, C Anele, OO Kennedy, F Olajide, CG Kennedy 2016 international conference on computational science and computational …, 2016 | 53 | 2016 |
Implementation of the enhanced fingerprint authentication in the ATM system using ATmega128 K Okokpujie, F Olajide, S John, CG Kennedy Proceedings of the international conference on security and management (SAM …, 2016 | 21 | 2016 |
Forensic live response and event reconstruction methods in Linux systems F Olajide, N Savage, D Ndzi, H Al-Sinani PGNET 2009: The 10th Annual PostGraduate Symposium on The Convergence of …, 2009 | 16 | 2009 |
Application level evidence from volatile memory F Olajide, N Savage Journal of Computing in Systems and Engineering 10, 171-175, 2009 | 13 | 2009 |
Developing a state of the art methodology and toolkit for ICS SCADA forensics M Betts, J Stirland, F Olajide, K Jones, H Janicke International Journal of Industrial Control Systems Security 1 (2), 44-56, 2016 | 11 | 2016 |
A technological approach towards the measurement of enterprise agility OC Williams, F Olajide 2020 15th Iberian Conference on Information Systems and Technologies (CISTI …, 2020 | 10 | 2020 |
On the extraction of forensically relevant information from physical memory F Olajide, N Savage 2011 World Congress on Internet Security (WorldCIS-2011), 248-252, 2011 | 10 | 2011 |
Sequences of numbers obtained by digit and iterative digit sums of Sophie Germain primes and its variants SA Bishop, HI Okagbue, MO Adamu, FA Olajide Global Journal of Pure and Applied Mathematics 12 (2), 1473-1480, 2016 | 9 | 2016 |
Power aware routing algorithms (PARA) in wireless mesh networks for emergency management T Al-Hadhrami, F Saeed, F Olajide Plos one 13 (10), e0204751, 2018 | 8 | 2018 |
Towards the investigation of using social network analysis for counter terrorism in West Africa: case study of Boko Haram in Nigeria F Olajide, K Adeshakin journal of engineering science and technology 11 (11), 1629-1638, 2016 | 8 | 2016 |
Exploring process of information systems and information technology for enterprise agility O Williams, F Olajide, T Al-Hadhrami, A Lotfi Emerging Trends in Intelligent Computing and Informatics: Data Science …, 2020 | 7 | 2020 |
Sensor network in automated hand hygiene systems using IoT for public building MO Omoyibo, T Al-Hadhrami, F Olajide, A Lotfi, AM Elmisery Emerging Trends in Intelligent Computing and Informatics: Data Science …, 2020 | 7 | 2020 |
An experimental validation of public cloud mobile banking O Daramola, F Olajide, A Adewumi Research Journal of Applied Sciences, Engineering and Technology 7 (24 …, 2014 | 7 | 2014 |
Digital forensic research—The analysis of user input on volatile memory of Windows application F Olajide, N Savage, G Akmayeva, C Shoniregun World Congress on Internet Security (WorldCIS-2012), 231-238, 2012 | 7 | 2012 |
Forensic extraction of user information in continuous block of evidence F Olajide, N Savage International Conference on Information Society (i-Society 2011), 476-481, 2011 | 7 | 2011 |
On the investigation of social network analysis for E-commerce transaction in south-west region of Nigeria F Olajide, K Adeshakin, S Misra, CK Ayo International Journal of Pharmacy and Technology 8 (4), 23108-23114, 2016 | 5 | 2016 |
On some suggested applications of sudoku in information systems security F Olajide Asian Journal of Information Technology 14 (4), 117-121, 2015 | 5 | 2015 |
Identifying and finding forensic evidence from Windows application F Olajide, N Savage, G Akmayeva, C Shoniregun Journal of Internet Technology and Secured Transactions 1 (4), 117-122, 2012 | 5 | 2012 |
Dispersal of time aspect of information stored on physical memory F Olajide, N Savage Cyberforensic-International Conference on Cybercrime Security and Digital …, 2011 | 5 | 2011 |
Forensic memory evidence of windows application F Olajide, N Savage, G Akmayeva, R Trafford 2012 International Conference for Internet Technology and Secured …, 2012 | 4 | 2012 |