no code implementations • 27 Feb 2024 • Tosin Ige, Christopher Kiekintveld, Aritran Piplai
The ever-evolving ways attacker continues to im prove their phishing techniques to bypass existing state-of-the-art phishing detection methods pose a mountain of challenges to researchers in both industry and academia research due to the inability of current approaches to detect complex phishing attack.
no code implementations • 26 Feb 2024 • Tosin Ige, Christopher Kiekintveld, Aritran Piplai
In this research, we analyzed the suitability of each of the current state-of-the-art machine learning models for various cyberattack detection from the past 5 years with a major emphasis on the most recent works for comparative study to identify the knowledge gap where work is still needed to be done with regard to detection of each category of cyberattack.
no code implementations • 2 Oct 2023 • Sikiru Adewale, Tosin Ige, Bolanle Hafiz Matti
Data preprocessing, model construction, and model training are discussed.
no code implementations • 22 Aug 2023 • Tosin Ige, Christopher Kiekintveld
Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world application.
no code implementations • 18 May 2023 • Amos Okomayin, Tosin Ige
Today, we have a mixture of young and older individuals, people with special needs, and people who can care for themselves.
no code implementations • 6 Mar 2023 • Tosin Ige, William Marfo, Justin Tonkinson, Sikiru Adewale, Bolanle Hafiz Matti
In this research, we focus on the usage of adversarial sampling to test for the fairness in the prediction of deep neural network model across different classes of image in a given dataset.
no code implementations • 6 Mar 2023 • Tosin Ige, Abosede Kolade, Olukunle Kolade
In this research work, we used open source computer vision (Open CV) and adaboost algorithm to develop a model which can detect a moving object a far off, classify it, automatically snap full image and face of the individual separately, and then run a background check on them against worldwide databases while making a prediction about an individual being a potential threat, intending immigrant, potential terrorists or extremist and then raise sound alarm.
no code implementations • 25 Jul 2022 • Tosin Ige, Sikiru Adewale
"Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue."