Sodiya, A. S: Publications

THESIS/DISSERTATION

  1. SODIYA, A. S. (1992). “Law Office Automation”, B.Sc. project, Faculty of Science, Ogun State University, Ago-Iwoye, Nigeria.
  2. SODIYA, A. S. (1998). “Impact of Computerisation of Banking Operation on Customers’ Services”, MBA project, Faculty Ogun State University, Ago- Iwoye, Nigeria.
  3. SODIYA, A. S. (1999). “Forecasting Enrolment using Fuzzy Time Series – A case Study of University of Agriculture, Abeokuta.”, MSc. Dissertation, University of Lagos, Nigeria.
  4. SODIYA, A. S. (2004). “A New Combined Strategy To Intrusion Detection”, PhD Thesis, University of Agriculture, Abeokuta, Nigeria.

PUBLISHED ARTICLES IN LEARNED JOURNALS

  • Sodiya, A. S., and Longe, H. O. D. (2004). “Intrusion Detection Systems: The problems, Prospects and the Way Forward”, Journal of Applied Computer Science, Vol. 12, No. 1, pp 83-95, ISSN: 1507-0360, published by Technical University of Lodz, Poland. Available online at http:/www.ics.p.lodz.pl/jacs.html
  • Sodiya, A. S. and Longe, H. O. D. (2004). “Critical Analysis of Current Anomaly-based Intrusion Detection Techniques”, Journal of Computer Science and Its Applications, An International Journal of the Nigeria Computer Society, Vol. 10, No. 1, pp 64-74, ISSN: 2006-5523, published by Nigeria Computer Society.
  • Sodiya, A. S., Longe, H. O. D., and Akinwale, A. T. (2004). “A New Two-tiered Strategy To Intrusion Detection”, International Journal of Information Management and Computer Security, Vol. 12, No 1, pp 27-43, ISSN: 0968-5227, published by Emerald, UK. Available online at www.emeraldinsight.com/imcs.htm
  • Sodiya, A. S., Longe, H.O.D. and Ibrahim, S. A. (2005). “Data Mining Based Intelligent Equipment Maintenance In Telecommunication Network”, Journal of Applied Computer Science, Vol. 13, No. 1, pp 29-38, ISSN: 1507-0360, published by Technical University of Lodz, Poland. Available online at http:/www.ics.p.lodz.pl/jacs.html
  • Sodiya, A. S. and Longe, H. O. D. (2005). “An Improved Two-Tiered Strategy To Intrusion Detection”, International Journal of Information Management and Computer Security, Vol. 13, No. 3, pp 235-243, ISSN: 0968-5227, published by Emerald, UK. Available online at www.emeraldinsight.com/imcs.htm
  • Sodiya, A. S., Longe, H. O. D., and Akinwale, A. T. (2005). “Maintaining Privacy in Anomaly-based Intrusion Detection System”, International Journal of Information Management and Computer Security, Vol. 13, No. 1, pp 72-80, ISSN: 0968-5227, published by Emerald, UK. Available online at www.emeraldinsight.com/imcs.htm
  • Ogunde A. O., Folorunso O. and Sodiya A. S. (2005). “An Improved Algorithm For Mining The Top-k Frequent Itemset With Minimum Length M In Transaction Databases”, International Journal of Agricultural Sciences, Science, Environment and Technology (ASSET), Vol. 4, No. 1., pp 57-73, ISSN 1595-9694, Published by University of Agriculture, Abeokuta, Nigeria.
  • Sodiya, A. S., Ibrahim, S. A., and Ajayi O. B. (2006). “Towards Building Secure Software Products”, Journal of Issues in Informing Science and Information Technology, ISSN: 1547-7684, Vol. 3, 2006, pp 635-646, ISSN: 1547-7684, published by Informing Science Institute, USA. Available online at http://IIST.org
  • Sodiya A. S. (2006): “Multi-level and Secured Agent-Based Intrusion Detection System”, Journal of Computing and Information Technology, Vol. 14, No. 3, pp 217-223, ISSN: 1330-1136, published by University of Zagreb, Croatia. Available online at www.cit.srce.hr
  • Sodiya A. S. (2007): “A Natural Language Architecture”, Journal of Computing and Information Technology, Vol. 15, No. 1, pp 25-32, ISSN: 1330-1136, published by University of Zagreb, Croatia. Available online at www.cit.srce.hr 
  • Sodiya, A. S., Onashoga, S. A., and Oladunjoye, B. A. (2007). “Threat Modeling Using Fuzzy Logic Paradigm”, Journal of Issues in Informing Science and Information Technology, USA, Vol. 4, 2007, pp 53-61, published by Informing Science Institute, USA. Available online at http://IIST.org
  • Sodiya, A. S., Longe, H. O. D., Onashoga, S. A., Awodele, O. and Omotosho, L. O. (2007). “An Improved Assessment of Personality Traits In Software Engineering”, Interdisciplinary Journal of Information, Knowledge and Management, Vol. 2, pp 163-177, IISN: 1555-1229, published by Informing Science Institute, USA. Available online at http://IJIKM.org
  • Sodiya, A. S., Ikuomola, A. J. and Adeniran, O. J. (2007). “An Expert System-based Site Security Officer”, Journal of Computing and Information Technology, Vol. 15, No. 3, 2007, pp 227-235, ISSN: 1330-1136, published by University of Zagreb, Croatia. Available online at www.cit.srce.hr
  • Sodiya, A. S., Longe, H. O. D., and Fasan, O. M. (2008). “Software Security Risk Analysis Using Fuzzy Expert System”, INFOCOMP: Journal of Computer Science, Vol. 7, No. 3, pp 70-77, ISSN: 1807-4545, published by Universidade Federal de Lavras, Brazil. Available online at www.dcc.ufla.br/infocomp
  • Sodiya, A. S. and Onashoga, S. A. (2009). “Components-based Access Control Architecture”, Journal of Issues in Informing Science and Information Technology, USA, Vol. 6, 2009, pp 53-61, ISSN: 1547-7684, published by Informing Science Institute. Available online at http://IIST.org
  • Onashoga, S. A., Sodiya, A. S., and Omotoso, B. G. (2009). “A Tabu Search Algorithm for Consumer Financial Optimization System”, Journal of Computer Science and Its Applications, Vol. 16, No. 1, June, 2009, ISSN: 2006-5523, published by Nigeria Computer Society.
  • Sodiya, A. S., Onashoga, S. A. and Adepoju, B. T. (2009). “Evaluating the Impact of Intrusions on Computer System”, Journal of Computer Science and Its Applications, Vol. 16, No. 1, June, 2009,  ISSN: 2006-5523, published by Nigeria Computer Society, Nigeria.
  • * Onashoga, S. A., Akinde, D. A. and Sodiya, A. S., (2009). “A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems ”,  Journal of Issues in Informing Science and Information Technology, USA, Vol. 6, 2009, pp 669-682, published by Informing Science Institute, USA. Available online at http://IIST.org
  • Sodiya, A. S., Akinwale, A. T., Okeleye, S. A. and Emmanuel, J. A. (2010). “A Decision Support System for Intercropping”, International Journal of Decision Support System Technology, 2, No. 3, 2010, pp. 51-66., ISSN: 1941-6296, published by Information Resources Management Association, USA. Available online at www.igi-global.com/ijdsst
  • Elugbadebo, O. J., Sodiya, A. S. and Folorunso, O. (2010). “A Multi-dimensional Constraint Gradient Mining”, Journal of Natural Science, Technology (JNSET), Vol 8, No. 1, ISSN: 1595-9694, published by University of Agriculture, Abeokuta, Nigeria.
  • Sodiya, A. S., Folorunso, O. and Ogunderu, O. P. (2011). “An Improved Semi-Global Algorithm for Masquerade Detection”, International Journal of Network Security, 13, No. 1, 2011, pp. 31-40, ISSN: 1816-353X, published by National Chung Hsing University, Taiwan. Available online at http://ijns.femto.com.tw/
  • Sodiya, A. S., Folorunso, O., Komolafe, P. A. and Ogunderu, O. P. (2011). “Preventing Authentication Systems from Keylogging Attacks”, International Journal of Privacy and Security, 7, No. 2, pp 3-27, ISSN: 1553-6548, published by Information Resource Management Association, USA. http://jips.cob.tamucc.edu/issues.htm
  • Sodiya, A. S., Onashoga, S. A., Afolorunso A. A. and Ogunderu, O. P. (2011). “A Countermeasure Algorithm For Password Guessing Attack”, International Journal of Information and Computer Security, 4, No. 4, ISSN: 1744-1765, published by Inderscience, Switzerland. http://www.inderscience.com/browse/index.php?journalID=151
  • Onashoga, S. A., Sodiya, A. S., Akinwale, A. T. and Falola, O. E. (2011). “Mining of prevailent ailments in health database using fp-growth algorithm”, International Journal of Data Engineering, 2, No. 2, ISSN: 2180-1274, published by Computer Science Press (CSC Journals), Malaysia. Available online a http://cscjournals.org/csc/description.php?JCode=IJDE
  • Adewole, A. P., Sodiya, A. S. and Arowolo, O. A. (2011). “A Receipt-free Multi-Authority E-Voting System”, International Journal of Computer Applications, Vol. 30, No. 6, pp 15-23, published by Foundation of Computer Science, New York, USA.
  • Ogunde A. O., Folorunso O., Sodiya A. S., Oguntuase, J. A. and Ogunleye, G. O. (2011). “An improved cost models for agent-based    association rule mining in distributed databases”,  Anale. Seria Informatica,  Vol. IX fasc. 1, pp 231– 250, published by “Tibiscus” University, Romania.
  • Ogunde, A .O., Folorunso, O., Sodiya, A. S. and Ogunleye, G. O. (2011). ”A Review of Some Issues and Challenges in Current Agent-Based Distributed Association Rule Mining”, Asian Journal of Information Technology, Vol. 10, No. 02, 2011, pg 84-95, published by Medwell Journal, Pakistan.
  • Orunsolu, A. A., Sodiya, A. S. and Oyekan, D. F. (2012). “Destructible Password Functionality Authentication Protocol”, African Journal of Computing and ICTs, Vol. 5, No. 2, ISSN: 2006-1781, published by IEEE Nigeria Computer Chapter. Available online at http://www.ajocict.net
  • Onashoga, S. A., Sodiya, A. S., and  folorunso, A.(2012). “A One-time Sever-specific Password Authentication Scheme”, Journal of Computing and Information Technology, 20, No. 2, pp 85-93, ISSN: 1330-1136, published by University of Zagreb, Croatia. Available online at www.cit.srce.hr
  • Akinwale, A. T., Shonubi, A. J., Adekoya, A. F., Sodiya, A. S and Mewomo, O. T. (2013). “Ontology of Input Validation Attack on Web Application”, Business Informatics, 4(30), pp 11-23, published by Wroclaw University of Economics, Poland. Available online at http://www.wydawnictwo.ue.wroc.pl/o_wydawnictwie/63,informatyka_ekonomiczna_business_informatics.html
  • Ikuomola, A. J., Sodiya, S., Akinwale, A. T. and Aborisade, D. O. (2013). “An Improved Cost-Sensitive Intrusion Response Model”, Journal of Information Assurance and Security, Vol. 8, No. 4, pp 147-155, published by Machine Intelligence Research Labs., USA.
  • Aborisade, D. O., Sodiya, S. and Ikuomola, A. J. (2013). “A Survivability Architecture for Object-Oriented Software Systems”, Journal of Information Assurance and Security, Vol. 8, No. 4, pp 167-176, published by Machine Intelligence Research Labs., USA.
  • Sodiya, S. and Orunsolu, A. A. (2013). “An Adaptive Hierarchical Access Control Architecture Using Compliance Variance”, Anale. Seria Informatica, Vol. 11, No. 2, pp 109-115, published by “Tibiscus” University, Romania.
  • Onashoga, A. S., Sodiya, A. S., Mewomo, O. T. and Fadeyi, I. M. (2013). “An Efficient Broadcast Encryption for Secure Group Communication”, INFOCOM Journal of Computer Science, Vol. 12, No. 2, pp 45-55, published by Universidade Federal de Lavras, Brazil. Available online at www.dcc.ufla.br/infocomp
  • Sodiya, A. S., Falana, O. J., Onashoga, S. A. and Badmus, B. S. (2014). “Adaptive Neuro-Fuzzy System for Malware Detection”, Journal of Computer Science and Its Applications, Vol. 21, No. 2, pp 20-31, published by Nigeria Computer Society, Nigeria.
  • Shonubi, A. J., Adekoya, A. F., Sodiya, A. S., and Mewomo, O. T. (2014). “An Ontology-based Intrusion Patterns Classification System”, Journal of Computer Science and Its Applications, Vol. 21, No. 2 , pp 32-46, published by Nigeria Computer Society, Nigeria.
  • Adejinmi, A. O. and Sodiya, A. S. (2014). “Context Dependent Threat Access Control System”, Journal of Computer Science and Information Technology, Vol. 2, No. 3&4 , pp 83-105, published by American Research Institute for Policy Development, USA. Available at  http://dx.doi.org/10.15640/jcsit.v2n3-4a5
  • Sodiya, A. S., Onashoga, S. A., Solarin-soda, T. and Falana, O. J. (2015). “A Hybrid Approach to Masquerade Detection”, Accepted for publication, Journal of Computer Science and Its Applications, published by Nigeria Computer Society, Vol. 25, No. 1.
  • Onashoga, S. A., Abayomi-Alli, O. O., Sodiya, A. S. and Ojo, D. A. (2015). “An Adaptive and Collaborative Server-Side SMS Spam Filtering Scheme Using Artificial Immune System”, Information Security Journal: A Global Perspective, Volume 24, 2015 – Issue 4-6, pp 133 – 145, published by Taylor and Francis.
  • Ogunde, A. O., Folorunso, O. and Sodiya, A. S. (2015). A partition enhanced mining algorithm for distributed association rule mining systems, Egyptian Informatics Journal, (2015) 16, pp 297–307, published by Elsevier. Available at http://dx.doi.org/10.1016/j.eij. 2015.06.006
  • Sodiya, A. S. and Adegbuyi, B. (2015). A Framework for Protecting Users’ Privacy in the Cloud, International Journal of Information Security and Privacy, USA. Vol. 4, No. 10, pp 1 – 11. DOI: 10.4018/IJISP. 2016100102.
  • Sodiya, A. S. and Adesegun, O. (2017). A Methamorphic Malware Detection System, International Journal of Information Security, Privacy and Digital Forensic, published by Nigeria Computer Society, Vol. 6, No. 2.
  • Orunsolu, A. A, Sodiya, A. S., Akinwale, A. T. and Olajuwon, B. (2017). A Users’ Awareness Study and Influences of Social-Demography Perception of Anti-Phishing Security Tips, Acta Informatica Pragensia, published by University of Economics, Prague, Czech republic, Vol. 7, No. 2, pp138-151.
  • Orunsolu, A., Afolabi, O., Sodiya, A. S. and Akinwale, A. T. (2017). An Anti-Phishing Scheme for Secured Web Transaction, International Journal of Electronics and Information Engineering, published by National Chung Hsing University, Taiwan, Vol. 6, No. 2.

PAPERS IN REFEREED CONFERENCE PROCEEDINGS

  • 45. Sodiya, A. S., Ajayi, O. B. and Oketayo, E. O. (2000). “Information Security for users of E-commerce”, Proceedings of the 16th National  Conference of Computer Association of Nigeria (COAN), O. Uwadia, H. O. D. Longe and A. D. Akinde (Eds)  pp 173-179, published by COAN.
  • Sodiya, A. S. and Folorunso, O. (2000). “Developing An Issue-based Decision Support System For Government Cabinet”, Proceedings of the 16th National Conference of Computer Association of Nigeria (COAN), O. Uwadia, H. O. D. Longe and A. D. Akinde (Eds) pp 221-232, published by COAN.
  • Sodiya, A. S., Ajayi, O. B. and Ibrahim, S. A. (2004). “The State of Information Security in South-Western Nigerian Educational Institutions”, Proceeding of 1st International Conference on Science and National Development, C. Eromosele, T. A. Arowolo, T. O. S. Popoola, I. A. Akpan (Eds), pp 38-45, ISBN: 978-2783-85-4, published by College of Natural Sciences, University of Agriculture, Abeokuta, Nigeria.
  • Sodiya, A. S., Onashoga, S. A., Dansu, B. M. and Adeleye, B. A. (2007). “An Assessment of Knowledge Management Capabilities of Nigerian Banking Institutions”, Proceeding of 2nd International Conference on Science and National Development, C. Eromosele, T. and T. O. S. Popoola (Eds), pp 132-137, ISBN: 978-2783-85-4, published by College of Natural Sciences, University of Agriculture, Abeokuta, Nigeria.
  • Onashoga, S. A., Sodiya, A. S., and Adekoya, A. O. (2007). “An e-Marketplace for UNAAB Campala”, Proceeding of 2nd International `Conference on Science and National Development, C. Eromosele, T. and T. O. S. Popoola (Eds), pp 138-145, ISBN: 978-2783-85-4, published by College of Natural Sciences, University of Agriculture, Abeokuta, Nigeria.
  • Sodiya, A. S., Akinwale A. T. and Onashoga, S. A. (2008). “A Framework for Mixed Cropping Decision Support System”, Proceedings of the 22nd National Conference of Nigeria Computer Society (NCS), O. Folajinmi and I. K. Oyeyinka (Eds) Vol. 19, pp 181-186, published by NCS.
  • Sodiya, A. S., Onashoga, S. A., Rosanwo, O. D. and Lawal, B. H. (2008). “Managing ICT Infrastructure in Higher Educational Institutions”, Proceeding of 3rd International Conference on Science and National Development, E. Asiribo and J. A. Oguntuase (Eds), pp 60-67, ISBN: 978-2783-85-4, published by College of Natural Sciences, University of Agriculture, Abeokuta, Nigeria.
  • Onashoga, S. A., Sodiya, A. S., and Akinlawon O. (2008). “An Analysis of performance of Employed I.T. Graduates”, Proceeding of 3rd International Conference on Science and National Development, O. E. Asiribo and J. A. Oguntuase (Eds), pp 68-73, ISBN: 978-2783-85-4, published by College of Natural Sciences, University of Agriculture, Abeokuta, Nigeria.
  • Orunsolu, A. A., Sodiya, A. S., Onashoga, S. A. and Afolorunso, A. A. (2010). “An Agent-Based Framework For Secure E-Voting”, Proceedings of the 23rd National Conference of Nigeria Computer Society (NCS), C. O. Uwadia, G. A. Aderounmu, Y. O. Folajinmi and V. Ejiofor (Eds) Vol. 21, pp 229-238, published by NCS.
  • Ikuomola, A. J., Sodiya, A. S. and Nehinbe J. O. (2010). “A Framework for Collaborative, Adaptive and Cost Sensitive Intrusion Response System”, Proceedings of Institute of Electrical and Electronics Engineers (IEEE), 1-4. Published by University of Essex, UK. ISSN: 978-1-4244-9029-5. Available at http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5606485&url
  • Sodiya, A. S., Onashoga, S. A. and Adelani, D. I. (2011). “A Secured E-voting Architecture”, Proceedings of the 8th International Conference on Information Technology: New Generations, Las Vegas, USA, Latifi (Ed), pp 342-347, published by international Institute of Electrical and Electronics Engineering (IEEE).
  • Onashoga, S. A. and Sodiya, A. S. (2011). “A Confidential Electronic Result Transfer Using a Hybrid XML Security Scheme”, Proceedings of the 8th International Conference on Information Technology: New Generations, Las Vegas, USA, Latifi (Ed), pp 397-402, published by international Institute of Electrical and Electronics Engineering (IEEE).
  • Ogunde A. O., Folorunso O., Sodiya A.  S., and Oguntuase, J. A.  (2011). “Towards an adaptive multi-agent architecture for association rule mining in distributed databases”. In IEEE Xplore database Adaptive Science and Technology (ICAST), 2011, 3rd IEEE International Conference on Adaptive Science and Technology, Pg 31 – 36.
  • Ogunde, A.O., Folorunso, O., and Sodiya, A. S. (2012). On the Adaptivity of Distributed Association Rule Mining Agents. Fourth International Conference on Adaptive and Self-Adaptive Systems and Applications, Adaptive 2012 Conference, IARIA July 22nd – 27th , Nice, France, www.iaria.org/conferences, Pg 69-74.
  • Ikuomola, A. J. and Sodiya, A. S. (2012). “A Credible Cost-Sensitive Model For Intrusion Response Selection”, Proceedings of Institute of Electrical and Electronics Engineers (IEEE), 222 – 227. Available at http://ieeexplore.ieee.org/application/mdl/mdlconfirmation.jsp?arnumber=6412406&icp=false
  • Agholor, S. and Sodiya, A. S. (2013). “An Assessment of Feedback Mechanism of Some Selected Websites Towards Improved End-users’ Password Selection”, Proceedings of the 23rd National Conference of Nigeria Computer Society (NCS), O. Uwadia, G. A. Aderounmu, Y. and A. S. Sodiya Vol. 24, published by NCS.
  • Aborisade, D. A., Reich, C., Sodiya, A. S. and Akinwale, A. T. (2016). “Call Response Rate as Baseline for Detecting DRDoS Attack in Cloud Database Service”, 5th Conference on Software Technology and Processes (STeP 2016) held on 3th May, 2016 at Hochschule Furtwangeng University, Germany. Pp 49 – 60. www.degruyter.com, http://www.step2016.de
  • Onuri, E., Sodiya, A. S. , Ebusiwa, O. and Akande, O. (2016). “Generic Prediction of Malaria Treatment Outcomes Using Big Data Analytics”, Proceedings of 26th National Conference of Nigeria Computer Society (NCS), Abuja.
  • Adesanya, M. B., Sodiya, A. S. and Onashoga, S. A. (2016). A combined scheme for credit card fraud detection, Proceedings of the 2nd International Conference on Intelligent Computing and Emerging Technologies, held between 20 – 22 November, 2016 at Babcock University, Ilisan, Ogun State.
  • Agholor, S., Sodiya, A. S. and Aborisade, D. A. (2016). A comparative analysis of cybersecurity laws of selected countries, Proceedings of the 2nd International Conference on Intelligent Computing and Emerging Technologies, held between 20 – 22 November, 2016 at Babcock University, Ilisan, Ogun State.
  • Okoro, U. R., Sodiya, A. S., Awodele O. and Kuyoro, O. S, D. A. (2016). A Game Ontology Model For Acquiring Business Skills, Proceedings of the 2nd International Conference on Intelligent Computing and Emerging Technologies, held between 20 – 22 November, 2016 at Babcock University, Ilisan, Ogun State.
  • Orunsolu A. A. and Sodiya, A. S. (2017). An Anti-Phishing Kit Scheme for Secure Web Transactions, Proceedings of the 3rd International Conference on Information Systems and Privacy, Portugal held between 19 – 21 February, 2017.
  • Orunsolu A. A., Sodiya, A. S. and Alaran A. A. (2018). An Anti-Phishing Kit Scheme for Secure Web Transactions, Proceedings of the 27th National Conference of Nigeria Computer Society, Ibadan, Oyo State held between 17 – 18 July, 2018.

Leave a Reply