Skip to main content

PUBLICATIONS

[b][u][size= small]Publications[/size][/u][/b]

[b][u][size= small] [/size][/u][/b]

  1. [size= small]Longe, O.B.(2010). Mitigating CAPTCHA Relay Attacks Using Multiple Challenge-Response Mechanism. Computer Information System (CIS) Journal, Vol. 4 No. 3. [url=http://sci.ui.edu.ng/sites/default/files/Mitigating CAPTCHA Relay Attacks Using Multiple Challenge.pdf]Read abstract[/url] [/size]
  2. [size= small][i]Longe,O.B,[/i][i] [/i][i]Mbarika, V,[/i] Kourouma, M, Wada, F & Isabalija, R. (2009). Seeing Beyond the Surface: Understanding and Tracking Fraudulent Cyber Activities. International Journal of Computer Science and Information Security. Vol. 6 (3) (pp. 124-135)[/size]
  3. [size= small]Chiemeke S.C. & Longe, O.B. (2008). Probability Modeling For Improving Spam Filtering Parameters. Journal of Information Technology Impact. Vol 8, No.1. Available online at [url=http://www.jiti.net/]www.jiti.net[/url][/size]
  4. [size= small]Longe, O.B., Robert, A.B.C, Chiemeke, S.C and Ojo. F.O. (2008).  Feature Outliers And Their Effects On The Efficiencies Of Text Classifiers In The Domain Of Electronic Mail. The Journal of Computer Science & Its Applications. Vol. 15, No. 2 .[/size]
  5. [size= small]Olufade F.W. Onifade, Longe O. Babatope & Akande Oyindamola. O (2008). Data Delivery Pattern Enhancement in Wireless Ad-Hoc Networks Using Co-ordinate Schemes. International Journal of Computing and ICT Research. Vol. 2, No. 2, pp. 75-83. [url=http://sci.ui.edu.ng/sites/default/files/Data Delivery Pattern Enhancement in Wireless Ad-Hoc Networks.pdf]http://www.ijcir.org/volume2-number2/article7.pdf  Read abstract[/url] [/size]
  6. [size= small]Longe,o.B., Wada, F. , Anadi, A, Jones, C. & Mbarika, V (2010). A Critical Appraisal of the Peel Theory of Community Policing in the Age  of Cybercrime. [b]84th Annual Meeting[/b][b] [/b]Louisiana State University at Alexandria.[url=http://www.laacademy.org/docs/Schedule.pdf]http://www.laacademy.org/doc…]
  7. [size= small]Longe O.B., Mbarika V.W.Jones .C. , Anadi .A., Wada .F. , Longe F.A. , Onifade .O.F.W. & Dada . G.   (2010). Can Any Good Thing Come from Nazareth - An Investigation into the Origins of 419 Spam Mails. Proceedings of the 3nd International Conference of the Int.  Centre for IT & Dev. Cameroon, March, 2010.[url=http://asictonline.org/images/stories/ICIA2010paperpresentations.pdf]ht…]
  8. [size= small]Longe O.B. & Dada . G. (2010). Covert Transmission of Embedded Image Using Stegacrypt. Proceedings of the 3nd International Conference of the Int.  Centre for IT & Dev. Cameroon, March, 2010.[url=http://asictonline.org/images/stories/ICIA2010paperpresentations.pdf]ht…]
  9. [size= small][b]Boateng[/b], R., Olumide, L., Mbarika, V., Avevor, I. and Isabalija, R.S. ([b]2010[/b]). Cyber Crime and Criminality in Ghana: Trends and Implications,[i]Proceedings of the Sixteenth Americas Conference on Information Systems[/i], Lima, Peru, August 12th-15th 2010[url=http://sci.ui.edu.ng/sites/default/files/Cyber Crime and Criminality in Ghana.pdf]. Read abstract[/url] [/size]
  10. [size= small]Longe, O.B., Abayomi-Alli, A., Shaib, I.O.& Longe, F.A. (2009). Adunni Enhanced Content Analysis of Fraudulent Nigeria Electronic Mails Using e-STAT. International Conference On Adaptive Science & Tech.[url=http://sci.ui.edu.ng/sites/default/files/Enhanced Content Analysis Of Fraudulent Nigeria Electronic Mails Using e-STAT.pdf]http://www.edictech.com/ICAST09/ICAST2009Program.pdf   Read abstract[/url] [/size]