Onashoga, S. A: Publications

A. ARTICLES IN LEARNED JOURNALS

  1. Sodiya, A. S., Longe, H.O.D. and Ibrahim, S. A., (2005). “Data Mining Based Intelligent Equipment Maintenance In Telecommunication Network”, Journal of Applied Computer Science, 13 (1); 29-38. Published by Technical University Press, Poland. ISSN: 1507-0360.Available online at http://yadda.icm.edu.pl/baztech /element/bwmeta1.element.baztech-article-LOD2-0006-0001 
  2. Sodiya, A. S., Onashoga, S. A., and Ajayi O. B. (2006). “Towards Building Secure Software Systems”, Journal of Issues in Informing Science and Information Technology. 3 (1); 635 – 646. Published by the Informing Science Institute (ISI), USA. ISSN: 1547-968.Available online at http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.5290
  1. Sam-Wobo, S. O., Mafiana, C. F., Onashoga, S. A., and Vincent, O. R. (2007). “MONRATE: A descriptive tool for calculation and prediction of re-infection of Ascarislumbricoides”,International Journal of Tropical Biology. 55 (3 – 4); 755 – 760.Published by Universidad de Costa-Rica, Costa-Rica.ISSN:0034-7744. Available online at: http://www.ots.ac.cr/tropiweb/attachments/volumes/vol55-3-4/01-SamWobo-Monrate.pdf. 
  1. Sodiya, A. S., Onashoga, S. A. and Ajayi, O. B. (2007). “Threat Modeling using Fuzzy Logic Paradigm,”Journal of Issues in Informing Science and Information Technology. 4 (1); 53 – 61.Published by the Informing Science Institute, USA. ISSN: 1547-5840.Available online athttp://iisit.org/Vol4/IISITv4p053-061Sodi261.pdf.
  1. Sodiya, A. S., Longe, H. O. D., Onashoga, S. A., Awodele, O. and Omotosho, L. O. (2007). “An Improved Assessment of Personality Traits in Software Engineering”, Interdisciplinary Journal of Information, Knowledge and Management, 2 (1); 163 – 177. Published by the Informing Science Institute, USA.ISSN:1555-1229.Available online at:http://ijikm.org/Volume2/IJIKMv2p163-177Sodiya.pdf.
  2. Sodiya, A. S. and Onashoga, S. A. (2009). “Component-based Access Control Architecture”, Journal of Issues in Informing Science and Information Technology. 6 (1); 53 – 61. Published by the Informing Science Institute (ISI), USA. ISSN: 1547-5867.Available online at: http://iisit.org/Vol6/IISITv6p699-706Sodiya650.pdf. 
  1. Onashoga, S. A., Sodiya, A. S., and Omotoso, B. G. (2009). “A Tabu Search Algorithm for Consumer Financial Optimization System”, Journal of Computer Science and Its Application, 16 (1); 34 – 44. An International Journal of the Nigeria Computer Society, Nigeria. ISSN: 2006 – 5523.Available online at: http://unaab.edu.ng/publicationsabstract/A%20Tabu%20Search%20Algorithm%20for%20Consumer%20Financial%20Optimization%20System.pdf
  1. Sodiya, A. S., Onashoga, S. A. and Adepoju, B. T. (2009). “Evaluating the Impact of Intrusions on Computer System”, Journal of Computer Science and Its Application, 16 (1); 111 – 122. An International Journal of the Nigeria Computer Society.ISSN: 2006 – 5523. Available online at: http://unaab.edu.ng/publication-abstracts/190-colnas/15446-evaluating-the-impact-of-intrusions-on-computer-systems-.html 
  1. Onashoga, S. A., Akinde, A. D. and Sodiya, A. S. (2009). “A Strategic Review of Existing Mobile Agent-based Intrusion Detection Systems”, Journal of Issues in Informing Science and Information Technology, 6 (1); 669 – 682. Published by the Informing Science Institute, USA. ISSN: 1547 – 5867.Available online at:http://iisit.org/Vol6/IISITv6p669-682Onashoga623.pdf.
  1. Akinwale, A. T., Adekoya, A. F. and Onashoga, S. A. (2010). “Egocentric Database Operations for Social and Economic Network Analysis”, Interdisciplinary Journal of information, Knowledge, and Management,5 (1); 293 – 303. Published by the Informing Science Institute, USA.ISSN: 1547-9684.Available online at:http://ijikm.org/Volume5/IJIKMv5p293-303Akinwale441.pdf.
  1. Sodiya, A.S., Folorunso, O., Onashoga, S.A. and Ogunderu, O.P. (2011). “An Improved Semi-Global Alignment Algorithm for Masquerade Detection”, International Journal of Network Security, 13 (1); 31 – 40. Published by National Chug Hsing University, Taiwan. ISSN: 1856 – 353X.Available online at: http://ijns.femto.com.tw/contents/ijns-v12-n3/ijns-2011-v12-n3-p211-220.pdf  
  1. Onashoga, S. A.,Sodiya, A.S., Akinwale, A. T. and Falola, O. E. (2011). “Mining of Prevailent Ailments in a Health database using FP-Growth Algorithm”, International Journal of Data Engineering (IJDE),2(2);75 -83.Published by Computer Science Press (CSC Journals), Malaysia.ISSN: 2180 – 1274. Available online at http://cscjournals.org/csc/description.php?J.  
  1. Onashoga, S. A.,Sodiya, A. S. and Afolorunso A. A. (2012). “A One-Time Server-Specific Password based Authentication Scheme” Journal of Computing and Information Technology, 20(2); 85 – 93. Published byUniversity Computing Centre,University of Zagreb, Zagreb, Croatia. ISSN: 1330 – 1136.Available online at http://cit.srce.unizg.hr/index.php/CIT/article/view/1983 
  1. Onashoga, S. A. and Akinwale, A. T. (2012). “A Secured Protocol for Preventing online dictionary attack”, The Journal of Computer and its Applications, 19 (1); 1 – 6.An International Journal of the Nigeria Computer Society, Nigeria. ISSN: 2006 –5523.Available on-line at http://unaab.edu.ng/publications-abstract/A%20Secured %20 Protocol%20For%20Preventing%20Online%20Dictionary%20Attack.pdf 
  1. Onashoga, S.A. (2012). “CLOLINK: An Adapted Algorithm for Mining closed frequent Itemsets”, Journal of Computing and Information Technology, 20(4); 265 – 276. Published by University Computing Centre,University of Zagreb, Zagreb, Croatia. ISSN: 1330 – 1136.Available online at http://cit.srce.unizg.hr/index.php /CIT/article/view/2017 
  2. Onashoga, S.A. Ajayi, O.B. and Akinwale, A.T. (2013). “A Simulated MultiAgent-Based Architecture for Intrusion Detection System”, International Journal of Advanced Research in Artificial Intelligence. 2 (4); 29 – 38. Published by Science and Information (SAI) Organization, USA. ISSN: 2165 –4050.Available online athttp://thesai.org/Downloads/IJARAI/Volume2No4/Paper6 Simulated Multiagent-Based_Architecture_for_ Intrusion_ Detection_System.pdf  
  1. Onashoga S.A., Mewomo O.T., Fadeyi I.M. and Olaniyi, K. A. (2013). “Securing Group Communication among Government Officials”, Journal of Computer Science and Its Application, 20 (1); 42 – 51.An International Journal of the Nigeria Computer Society, Nigeria. ISSN: 2006 – 5523. 
  1. *Onashoga S. A., Sodiya A. S., Mewomo O. T. and Fadeyi, I. M. (2013). “An Efficient Broadcast Encryption for Secure Group Communication”, INFOCOMP Journal of Computer Science,Vol. 12 (2); 44 – 55. Published byFederal University of Lavras (UFLA), Brazil. ISSN: 1807-4545
  1. *Onashoga A., Abayomi-Alli A., and Ogunseye T. (2014). “Enhanced Role Based Access Control Mechanism for Electronic Examination System”, International Journal of Computer Network and Information Security (IJCNIS), Vol. 6 (3); 1 – 9. Published by MECS Publisher, Hong Kong. ISSN: 2074-9090.
  1. *Sodiya, A. S., Falana, O. J., Onashoga, S. A. and Badmus, B. S. (2014). “Adaptive Neuro-Fuzzy System for Malware Detection”, Journal of Computer Science and Its Applications, 21, No. 2, pp 20-31, published by Nigeria Computer Society, Nigeria.
  1. *Sodiya, A. S.,Onashoga, S. A., Solarin-soda, T. and Falana, O. J. (2015). “A Hybrid Approach to Masquerade Detection”, Journal of Computer Science and Its Applications, 21, No. 2, pp 20-31, published by Nigeria Computer Society, Nigeria.
  1. *Onashoga S. A., Abayomi-Alli O. O., Sodiya A. S. and Ojo D. O. (2015). “An Adaptive and Collaborative Server-Side SMS Spam Filtering Scheme Using Artificial Immune System”, Information Security Journal: A Global Perspective, 20, pp 1 – 13. Published by Taylors & Francis, USA. 
  1. A.,Abayomi-Alli A., Idowu O. and Okesola, J. O. (2016). “A Hybrid Approach for Detecting Malicious Web Pages Using Decision Tree and Naives Bayes Algorithms”, Georgia Electronic Scientific Journal: Computer Science and Telecommunication. Vol. 2 (48); pp 9 – 17. Published by Georgian Technical University and Georgian University of The Patriarchy of Georgia, Georgia. ISSN 1512-1232.http://gesj.internet-academy.org.ge/download.php?id=2734.pdf
  1. Okesola, J. O., Onashoga, S. A., Ogunbanwo, A. S. (2016). “An Investigation into User’s Information Security Awareness on Social Networks in South Western Nigeria”,South African Journal of Information Management, Vol. 18 (1), To be publishedby AOSIS Publishing, South Africa. http://dx.doi.org/10.4102/sajim.v18i1.721. 
  1. Onashoga, S. A., Ogunjobi, A. O., Ibharalu, F. T. and Lawal, O. A. (2016). “A Secure Framework for SMS-Based Service Delivery in m-GOVERMENT Using Multicast Encryption Scheme”.African Journal of Science, Technology, Innovation and Development. To be published by Taylors and Francis, USA. 
  1. Onashoga, S. A., Oyeleke, O., Ojesanmi, O. A. and Agboola, A. A. A. (2016). “A Secure Embedded Scheme Based on Multi-Cryptographic Protocols”, Journal of Natural Science, Engineering and Technology, to be published by Federal University of Agriculture, Abeokuta. 
  1. *Onashoga S. A.,Bamiro, B. A., Akinwale, A. T. and Oguntuase, J. A. (2017). “KC-Slice: A dynamic privacy-preserving data publishing techniques for multisensitive attributes”, Information Security Journal: A Global Perspective, 26, Issue 3, pp 121 – 135. Published by Taylors & Francis, USA.
  1. Adesanya, A. M. and Onashoga, S. A. (2017). “ A Combined Scheme for Credit Card Fraud Detection”, International Journal of Information Security, Privacy & Digital Forensic, Vol. 1 No 1, pp 10 – 15. Published by Information Technology Systems and Security Professionals, Nigeria.
  1. Adebukola Onashoga, Olusegun Ojesanmi, Femi Johnson & Femi Emmanuel Ayo (2018). “A fuzzy-based decision support system for soil selection in olericulture”, Journal of Agricultural Informatics (ISSN 2061-862X) 2018 Vol. 9, No. 3:65-77. Publisher: Hungarian Association of Agricultural Informatics (HAAI)
  1. Onashoga S. A., Ojo, O. E.& Soyombo, O. (2018). “Securix: A 3D Game-Based Learning Approach for Phishing Attack Awareness”,Journal of Cyber Security Technology, Published by Taylors & Francis (In Print)

Leave a Reply