Showing
1 - 5
results of
5
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Ayoade, Gbadebo
Search Results - Ayoade, Gbadebo
Showing
1 - 5
results of
5
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions
by
Bauman, Erick
,
Ayoade, Gbadebo
,
Lin, Zhiqiang
Published in
ACM computing surveys
Get full text
Items that this one cites
Article
Save to List
Saved in:
2
Loading…
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data
by
Li, Yi-Fan
,
Gao, Yang
,
Ayoade, Gbadebo
,
Khan, Latifur
,
Singhal, Anoop
,
Thuraisingham, Bhavani
Published in
IEEE transactions on dependable and secure computing
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
3
Loading…
Advanced Persistent Threat Detection Using Data Provenance and Metric Learning
by
Akbar, Khandakar Ashrafi
,
Wang, Yigong
,
Ayoade, Gbadebo
,
Gao, Yang
,
Singhal, Anoop
,
Khan, Latifur
,
Thuraisingham, Bhavani
,
Jee, Kangkook
Published in
IEEE transactions on dependable and secure computing
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
4
Loading…
Crook-sourced intrusion detection as a service
by
Araujo, Frederico
,
Ayoade, Gbadebo
,
Al-Naami, Khaled
,
Gao, Yang
,
Hamlen, Kevin W.
,
Khan, Latifur
Published in
Journal of information security and applications
Get full text
Items that this one cites
Article
Save to List
Saved in:
5
Loading…
Secure data processing for IoT middleware systems
by
Ayoade, Gbadebo
,
El-Ghamry, Amir
,
Karande, Vishal
,
Khan, Latifur
,
Alrahmawy, Mohammed
,
Rashad, Magdi Zakria
Published in
The Journal of supercomputing
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Peer Reviewed
3 results
3
Full Text
5 results
5
Format
Articles
5 results
5
Journal Title
Ieee Transactions On Dependable And Secure Computing
2 results
2
Acm Computing Surveys
1 results
1
Journal Of Information Security And Applications
1 results
1
The Journal Of Supercomputing
1 results
1
Subjects
Computer Science
5 results
5
Science & Technology
5 results
5
Technology
5 results
5
Computer Science, Hardware & Architecture
3 results
3
Computer Science, Information Systems
3 results
3
Classification
2 results
2
Cloud Computing
2 results
2
Computer Science, Software Engineering
2 results
2
Computer Science, Theory & Methods
2 results
2
Access Control
1 results
1
Advanced Persistent Threat
1 results
1
Algorithms
1 results
1
Attack Detection
1 results
1
Automation
1 results
1
Beobachtungssystem
1 results
1
Calculators
1 results
1
Compilers
1 results
1
Computer Information Security
1 results
1
Cyberdeception
1 results
1
Data Integrity
1 results
1
Year of Publication
From:
To:
Source
Ieee Electronic Library (Iel) Journals
2 results
2
Ieee Xplore All Journals
2 results
2
Abi/Inform Global
2 results
2
Acm Digital Library Complete
1 results
1
Ebsco Business Source Ultimate
1 results
1
Association For Computing Machinery:jisc Collections:acm Open Journals 2023-2025 (Reading List)
1 results
1
Springer Nature
1 results
1
Elsevier Sciencedirect Journals
1 results
1
Elsevier Sciencedirect Freedom Collection 2023
1 results
1
Springer Online Journals Archive Complete
1 results
1
Springer Journals New Starts & Take-Overs Collection
1 results
1