State-of-the-art in artificial neural network applications: A survey
Abiodun, Oludare Isaac, Jantan, Aman, Omolara, Abiodun Esther, Dada, Kemi Victoria, Mohamed, Nachaat AbdElatif, Arshad, Humaira
Published in Heliyon (01.11.2018)
Published in Heliyon (01.11.2018)
Get full text
Journal Article
Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition
Abiodun, Oludare Isaac, Kiru, Muhammad Ubale, Jantan, Aman, Omolara, Abiodun Esther, Dada, Kemi Victoria, Umar, Abubakar Malah, Linus, Okafor Uchenwa, Arshad, Humaira, Kazaure, Abdullahi Aminu, Gana, Usman
Published in IEEE access (2019)
Published in IEEE access (2019)
Get full text
Journal Article
HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys
Esther Omolara, Abiodun, Jantan, Aman, Abiodun, Oludare Isaac, Arshad, Humaira, Dada, Kemi Victoria, Emmanuel, Etuh
Published in Health informatics journal (01.09.2020)
Published in Health informatics journal (01.09.2020)
Get full text
Journal Article
Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks
Ghanem, Waheed Ali H. M., Ghaleb, Sanaa Abduljabbar Ahmed, Jantan, Aman, Nasser, Abdullah B., Saleh, Sami Abdulla Mohsen, Ngah, Amir, Alhadi, Arifah Che, Arshad, Humaira, Saad, Abdul-Malik H. Y., Omolara, Abiodun Esther, El-Ebiary, Yousef A. Baker, Abiodun, Oludare Isaac
Published in IEEE access (2022)
Published in IEEE access (2022)
Get full text
Journal Article
Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse
Ahmed, Abdulghani Ali, Jantan, Aman, Rasmi, Mohammed
Published in Journal of network and systems management (01.06.2013)
Published in Journal of network and systems management (01.06.2013)
Get full text
Journal Article
Formal knowledge model for online social network forensics
Arshad, Humaira, Jantan, Aman, Hoon, Gan Keng, Abiodun, Isaac Oludare
Published in Computers & security (01.02.2020)
Published in Computers & security (01.02.2020)
Get full text
Journal Article
Filtration model for the detection of malicious traffic in large-scale networks
Ahmed, Abdulghani Ali, Jantan, Aman, Wan, Tat-Chee
Published in Computer communications (15.05.2016)
Published in Computer communications (15.05.2016)
Get full text
Journal Article