default search action
Boniface K. Alese
Person information
- affiliation: Federal University of Technology, Akure, Nigeria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j9]Henry Chima Ukwuoma, Arome Junior Gabriel, Aderonke F. Thompson, Boniface Kayode Alese:
Post-quantum cryptography-driven security framework for cloud computing. Open Comput. Sci. 12(1): 142-153 (2022) - 2021
- [j8]Princewill Akpojotor, Adebayo Olusola Adetunmbi, Boniface K. Alese, Ayodeji Oluwatope:
Automatic license plate recognition on microprocessors and custom computing platforms: A review. IET Image Process. 15(12): 2717-2735 (2021) - 2020
- [j7]Olasehinde Olayemi Oladimeji, Boniface Kayode Alese, Adebayo Olusola Adetunmbi, Aladesote Olomi Isaiah:
Evaluation of Selected Stacked Ensemble Models for the Optimal Multi-class Cyber-Attacks Detection. Int. J. Cyber Situational Aware. 5(1): 26-48 (2020) - [j6]Aderonke F. Thompson, Oghenerukevwe E. Oyinloye, Matthew T. David, Boniface K. Alese:
A Secured System for Internet Enabled Host Devices. Netw. Commun. Technol. 5(1): 26-36 (2020) - [j5]O. Amusan, Aderonke F. Thompson, Timilehin B. Aderinola, Boniface K. Alese:
Modelling Malicious Attack in Social Networks. Netw. Commun. Technol. 5(1): 37-43 (2020) - 2019
- [j4]Arome Junior Gabriel, Boniface Kayode Alese, Adebayo O. Adetunmbi, Olumide Sunday Adewale, Oluwafemi A. Sarumi:
Post-Quantum Crystography System for Secure Electronic Voting. Open Comput. Sci. 9(1): 292-298 (2019) - 2017
- [j3]Timilehin B. Aderinola, Aderonke F. Thompson, Boniface K. Alese:
Epidemic Response Model for Malware Defense on Computer Networks. Int. J. Cyber Situational Aware. 2(1): 69-84 (2017) - 2015
- [j2]Boniface K. Alese, Sylvester O. Olatunji, Oluwatoyin C. Agbonifo, Aderonke F. Thompson:
A Fine-Grained Data Access Control System in Wireless Sensor Network. Acta Informatica Pragensia 4(3): 276-287 (2015) - 2010
- [j1]Oloruntoba Ogundele, Boniface K. Alese, Olumuyiwa Mathew:
A Bio-Inspired Concept for Information Security Modelling. Int. J. Green Comput. 1(1): 53-67 (2010)
Conference and Workshop Papers
- 2023
- [c21]James Nicholson, Opeyemi Dele-Ajayi, Kemi Fasae, Boniface Kayode Alese:
Friendly Folk Advice: Exploring Cybersecurity Information Sharing in Nigeria. INTERACT (1) 2023: 369-378 - 2021
- [c20]Henry Chima Ukwuoma, Arome Junior Gabriel, Aderonke F. Thompson, Boniface Kayode Alese:
Optimised Privacy Model for Cloud Data. ICCSE 2021: 267-269 - 2020
- [c19]Felix Larbi Aryeh, Boniface Kayode Alese, Olasehinde Olayemi Oladimeji:
Graphical analysis of captured network packets for detection of suspicious network nodes. CyberSA 2020: 1-5 - [c18]Felix Larbi Aryeh, Boniface Kayode Alese:
A Multi-layer Stack Ensemble Approach to Improve Intrusion Detection System's Prediction Accuracy. ICITST 2020: 1-6 - [c17]Lawrence Bunmi Adewole, Adebayo O. Adetunmbi, Boniface K. Alese, Samuel A. Oluwadare, Oluwatoyin Bunmi Abiola, Olaiya Folorunsho:
Automatic Vowel Elision Resolution in Yorùbá Language. SAICSIT 2020: 126-133 - 2017
- [c16]Olugbemiga Solomon Popoola, Boniface Kayode Alese, Ayodele Solomon Kupoluyi, Caleb Ayodeji Ehinju, Adebayo Olusola Adetunmibi:
Design of a Secure Public Accounts System for Enhanced War Against Corruption Using Intelligent Software Agent. AFRICOMM 2017: 246-252 - [c15]Boniface Kayode Alese, Abimbola Akindele, Folasade Mojisola Dahunsi, Aderonke F. Thompson, Tosin Adesuyi:
A graphic-based cryptographic model for authentication. CyberSA 2017: 1-10 - [c14]Boniface Kayode Alese, Aderonke F. Thompson, Patricia Yetunde Oni:
A location privacy system in mobile network using game theory. CyberSA 2017: 1-5 - 2015
- [c13]Dauda Adenusi, Boniface Kayode Alese, Bamidele Moses Kuboye, Aderonke Favour-Bethy Thompson:
Development of cyber situation awareness model. CyberSA 2015: 1-11 - [c12]Moyinoluwa Abidemi Bode, Samuel Adebayo Oluwadare, Boniface Kayode Alese, Aderonke Favour-Bethy Thompson:
Risk analysis in cyber situation awareness using Bayesian approach. CyberSA 2015: 1-12 - 2014
- [c11]Boniface Kayode Alese, R. A. Akingbola, Folasade Mojisola Dahunsi, Olumide S. Adewale, T. J. Ogundele:
Improving deception in honeynet: Through data manipulation. ICITST 2014: 198-204 - [c10]Bamidele Moses Kuboye, Boniface Kayode Alese, Olumide Sunday Adewale:
Multi-level access priority channel allocation strategies in Global System for Mobile communications (GSM) networks. ICITST 2014: 288-294 - [c9]Otasowie Iyare, Aderonke Favour-Bethy Thompson, Boniface Kayode Alese:
A replication model for students' result processing. ICITST 2014: 295-301 - [c8]F. Y. Osisanwo, Adebayo O. Adetunmbi, Boniface Kayode Alese:
Barefoot morphology: A person unique feature for forensic identification. ICITST 2014: 356-359 - [c7]L. A. Nwosu, Aderonke Favour-Bethy Thompson, Boniface Kayode Alese, Olumide Olayinka Obe:
An Attribute-Based Signature using rivest shamir adleman scheme. ICITST 2014: 380-386 - [c6]Boniface Kayode Alese, O. Oyebade, A. Osuolale Festus, Otasowie Iyare, Aderonke Favour-Bethy Thompson:
Evaluation of information security risks using hybrid assessment model. ICITST 2014: 387-395 - [c5]Abikoye Oluwakemi Christianah, Boniface Kayode Alese, Aderonke Favour-Bethy Thompson, D. Alowolodu Olufunso, A. Osuolale Festus:
A robust multicast authentication scheme based on asymmetric key signature. ICITST 2014: 449-458 - 2013
- [c4]Boniface Kayode Alese, Iwasokun Gabriel Babatunde, Haruna Danjuma Israel:
DGM approach to network attacker and defender strategies. ICITST 2013: 313-320 - [c3]O. A. Akinsowon, Boniface Kayode Alese:
Edge detection methods in palm-print identification. ICITST 2013: 422-426 - [c2]Arome Junior Gabriel, Boniface Kayode Alese, Adebayo O. Adetunmbi, Olumide S. Adewale:
Post-Quantum Crystography: A combination of Post-Quantum Cryptography and Steganography. ICITST 2013: 449-452 - [c1]Akintoba Emmanuel Akinwonmi, Boniface Kayode Alese:
A prosodic Text-to-Speech system for Yorùbá language. ICITST 2013: 630-635
Coauthor Index
aka: Aderonke Favour-Bethy Thompson
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-14 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint