Get my own profile
Public access
View all0 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Kayode AleseProfessor of Information and Cyber Security, The Federal University of Technology, Akure, NigeriaVerified email at futa.edu.ng
- otasowie Owolafe (Iyare)Department of Cyber Security, Federal University of Technology, AkureVerified email at futa.edu.ng
- Emmanuel IbidunmoyeUmeå UniversityVerified email at cs.umu.se
- Olufunso Dayo ALOWOLODUFEDERAL UNIVERSITY OF TECHNOLOGY, AKURE, ONDO STATE NIGERIAVerified email at futa.edu.ng
- Bamidele Moses KuboyeInformation Technology Dept, School of Computing, Federal University of technology, Akure, OndoVerified email at futa.edu.ng
- Afolayan A.H.Lecturer in Department of Information Systems, Federal University of Technology Akure, Ondo StateVerified email at futa.edu.ng
- Victor BalogunUniversity of WinnipegVerified email at uwinnipeg.ca
- Tosin AdesuyiDepartment of Software Engineering, Kumoh National Institute of TechnologyVerified email at kumoh.ac.kr
- Oluwafemi A. SarumiResearch Fellow, University of DüsseldorfVerified email at hhu.de
- Akintoba AkinwonmiLecturer Computer Science, Federal University of Technology, Akure, NigeriaVerified email at futa.edu.ng
Follow
Aderonke Favour-Bethy Thompson
Research Scientist (ERCIM Fellow) at VTT Technical Research Institute of Finland.
Verified email at vtt.fi