A combined negative selection algorithm–particle swarm optimization for an email spam detection system I Idris, A Selamat, NT Nguyen, S Omatu, O Krejcar, K Kuca, M Penhaker Engineering applications of artificial intelligence 39, 33-44, 2015 | 148 | 2015 |
Improved email spam detection model with negative selection algorithm and particle swarm optimization I Idris, A Selamat Applied Soft Computing 22, 11-27, 2014 | 114 | 2014 |
Hybrid email spam detection model with negative selection algorithm and differential evolution I Idris, A Selamat, S Omatu Engineering Applications of Artificial Intelligence 28, 97-110, 2014 | 98 | 2014 |
Comparative analysis of classification algorithms for email spam detection SM Abdulhamid, M Shuaib, O Osho, I Ismaila, JK Alhassan International Journal of Computer Network and Information Security 10 (1), 60-67, 2018 | 80 | 2018 |
Tasks scheduling technique using league championship algorithm for makespan minimization in IAAS cloud SM Abdulhamid, MSA Latiff, I Idris arXiv preprint arXiv:1510.03173, 2015 | 63 | 2015 |
Whale optimization algorithm-based email spam feature selection method using rotation forest algorithm for classification M Shuaib, SM Abdulhamid, OS Adebayo, O Osho, I Idris, JK Alhassan, ... SN Applied Sciences 1, 1-17, 2019 | 48 | 2019 |
An improved AIS based e-mail classification technique for spam detection I Idris, SM Abdulhamid arXiv preprint arXiv:1402.1242, 2014 | 26 | 2014 |
Model and algorithm in artificial immune system for spam detection I Idris International Journal of Artificial Intelligence & Applications 3 (1), 83, 2012 | 24 | 2012 |
Enhanced decision tree-j48 with smote machine learning algorithm for effective botnet detection in imbalance dataset IA Jimoh, I Ismaila, M Olalere 2019 15th International Conference on Electronics, Computer and Computation …, 2019 | 23 | 2019 |
E-mail spam classification with artificial neural network and negative selection algorithm I Idris International Journal of Computer Science & Communication Networks 1 (3 …, 2011 | 21 | 2011 |
Design Evaluation of Some Nigerian University Portals: A Programmer's Point of View SM Abdulhamid, I Idris arXiv preprint arXiv:1402.1241, 2014 | 15 | 2014 |
DDOS attack detection in SDN: Method of attacks, detection techniques, challenges and research gaps AA Wabi, I Idris, OM Olaniyi, JA Ojeniyi Computers & Security 139, 103652, 2024 | 13 | 2024 |
Hybridized technique for copy-move forgery detection using discrete cosine transform and speeded-up robust feature techniques JA Ojeniyi, BO Adedayo, I Ismaila, AM Shafi’i International Journal of Image, Graphics and Signal Processing 10 (4), 22, 2018 | 13 | 2018 |
Forensic analysis of mobile banking applications in nigeria AA Uduimoh, O Osho, I Ismaila, MA Shafi’i i-manager's Journal on Mobile Applications and Technologies 6 (1), 9, 2019 | 11 | 2019 |
A swarm negative selection algorithm for email spam detection I Idris, A Selamat J Comput Eng Inf Technol 4 (1), 2, 2015 | 11 | 2015 |
Assessment of Information Security Awareness among Online Banking Costumers in Nigeria O Morufu, OW Victor, I Ismaila, SA Olawale, O Ololade International Journal of Advanced Research in Computer Science and Software …, 2014 | 10 | 2014 |
Negative selection algorithm in artificial immune system for spam detection I Idris, A Selamat 2011 Malaysian Conference in Software Engineering, 379-382, 2011 | 10 | 2011 |
Big data analytics and data security in the cloud via fully homomorphic encryption OW Victor, KA John, I Ismaila, ND Moses World Academy of Science, Engineering and Technology International Journal …, 2015 | 8 | 2015 |
An intelligent crypto-locker ransomware detection technique using support vector machine classification and greywolf optimization algorithm AM Maigida, SM Abdulhamid, O Morufu Journal on Software Engineering, 2018 | 5 | 2018 |
A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection Attack M Olalere, RA Egigogo, JA Ojeniyi, I Ismaila, RG Jimoh | 5 | 2018 |