Follow
Rume Elizabeth Yoro
Rume Elizabeth Yoro
Dennis Osadebay University Asaba
Verified email at dou.edu.ng - Homepage
Title
Cited by
Cited by
Year
Genetic algorithm rule-based intrusion detection system (GAIDS)
AA Ojugo, AO Eboka, O Okonta, R Yoro, F Aghware
Journal of Emerging Trends in Computing and Information Sciences 3 (8), 1182 …, 2012
1132012
Forging a deep learning neural network intrusion detection framework to curb the distributed denial of service attack
AA Ojugo, RE Yoro
International Journal of Electrical and Computer Engineering 11 (2), 1498, 2021
572021
Hybrid model for early diabetes diagnosis
AA Ojugo, AO Eboka, RE Yoro, MO Yerokun, FN Efozia
2015 Second International Conference on Mathematics and Computers in …, 2015
522015
A hybrid artificial neural network gravitational search algorithm for rainfall runoffs modeling and simulation in hydrology
AA Ojugo, J Emudianughe, RE Yoro, EO Okonta, AO Eboka
Prog Intell Comput Appl 2 (1), 22-33, 2013
522013
Evidence of personality traits on phishing attack menace among selected university undergraduates in Nigerian
RE Yoro, FO Aghware, MI Akazue, AE Ibor, AA Ojugo
International Journal of Electrical and Computer Engineering 13 (2), 1943, 2023
502023
Improved services traceability and management of a food value chain using block-chain network: a case of Nigeria
MI Akazue, RE Yoro, BO Malasowe, O Nwankwo, AA Ojugo
Indonesian Journal of Electrical Engineering and Computer Science 29 (3 …, 2023
492023
Assessing contributor features to phishing susceptibility amongst students of petroleum resources varsity in Nigeria
RE Yoro, FO Aghware, BO Malasowe, O Nwankwo, AA Ojugo
Int. J. Electr. Comput. Eng 13 (2), 1922, 2023
452023
Empirical evidence of phishing menace among undergraduate smartphone users in selected universities in Nigeria
MI Akazue, AA Ojugo, RE Yoro, BO Malasowe, O Nwankwo
Indonesian Journal of Electrical Engineering and Computer Science 28 (3 …, 2022
442022
Predicting Futures price and contract portfolios using the ARIMA model: a case of Nigeria’s Bonny light and forcados
AA Ojugo, RE Yoro
Quantitative Economics and Management Studies 1 (4), 237-248, 2020
402020
Sentiment analysis in detecting sophistication and degradation cues in malicious web contents
FO Aghware, RE Yoro, PO Ejeh, CC Odiakaose, FU Emordi, AA Ojugo
Kongzhi yu Juece/Control Decis 38 (01), 653-665, 2023
392023
Extending the three-tier constructivist learning model for alternative delivery: ahead the COVID-19 pandemic in Nigeria
AA Ojugo, RE Yoro
Indonesian Journal of Electrical Engineering and Computer Science 21 (3), 1673, 2021
392021
DeLClustE: Protecting Users from Credit-Card Fraud Transaction via the Deep-Learning Cluster Ensemble
FO Aghware, RE Yoro, PO Ejeh, CC Odiakaose, FU Emordi, AA Ojugo
International Journal of Advanced Computer Science and Applications 14 (6), 2023
382023
Dependable community-cloud framework for smartphones
AA Ojugo, FO Aghware, RE Yoro, MO Yerokun, AO Eboka, CN Anujeonye, ...
American Journal of Networks and Communications 4 (4), 95-103, 2015
372015
Computational intelligence in stochastic solution for Toroidal Queen
AA Ojugo, R Yoro
Progress in Intelligence Computing and Applications 2 (1), 46-56, 2013
372013
Framework design for statistical fraud detection
AA Ojugo, AO Eboka, RE Yoro, MO Yerokun, FN Efozia
Mathematics and Computers in Sciences and Engineering Series 50, 176-182, 2015
362015
An Intelligent Model Using Relationship in Weather Conditions to Predict Livestock-Fish Farming Yield and Production in Nigeria
RE Yoro, AA Ojugo
American Journal of Modeling and Optimization 7 (2), 35-41, 2019
302019
Immunization problem for Ebola virus in rural Sierra-Leone
AA Ojugo, D Oyemade, D Allenotor, RE Yoro, CN Anujeonye
African J. of Comp. & ICT 8 (1), 2015
252015
Technical issues for IP-based telephony in Nigeria
AA Ojugo, R Abere, B Orhionkpaiyo, R Yoro, A Eboka
Int. J. Wireless Comm. & Mobile Comp 1 (2), 58-67, 2013
242013
Robust cellular network rural telephony in Southern Nigeria
AA Ojugo, RE Yoro, DA Oyemade, AO Eboka, E Ugboh, F Aghware
American Journal of Networks and Communications 2 (5), 125, 2013
232013
Empirical solution for an optimized machine learning framework for anomaly-based network intrusion detection
AA Ojugo, RE Yoro
Technology Report of Kansai University 62 (08), 6353-6364, 2020
212020
The system can't perform the operation now. Try again later.
Articles 1–20