I agree that this site is using cookies. You can find further informations
here
.
X
Login
My folder (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
Show Desktop-Version
Toggle navigation
Olukoya, Oluwafemi
19
results:
Search for persons
X
Format
Online (19)
Mediatypes
Articles (Online) (8)
OpenAccess-fulltext (11)
Sorted by: Relevance
Sorted by: Year
?
1
A temporal analysis and evaluation of fuzzy hashing algorit..:
Fleming, Murray
;
Olukoya, Oluwafemi
Forensic Science International: Digital Investigation. 49 (2024) - p. 301770 , 2024
Link:
https://doi.org/10.1016/..
?
2
Runtime and Design Time Completeness Checking of Dangerous ..:
Mcconkey, Ryan
;
Olukoya, Oluwafemi
IEEE Access. 12 (2024) - p. 1-22 , 2024
Link:
https://doi.org/10.1109/..
?
3
Voice spoofing detection for multiclass attack classificati..:
Boyd, Jason
;
Fahim, Muhammad
;
Olukoya, Oluwafemi
Machine Learning with Applications. 14 (2023) - p. 100503 , 2023
Link:
https://doi.org/10.1016/..
?
4
Nation-State Threat Actor Attribution Using Fuzzy Hashing:
Kida, Michal
;
Olukoya, Oluwafemi
IEEE Access. 11 (2023) - p. 1148-1165 , 2023
Link:
https://doi.org/10.1109/..
?
5
Assessing frameworks for eliciting privacy & security requi..:
Olukoya, Oluwafemi
Computers & Security. 117 (2022) - p. 102697 , 2022
Link:
https://doi.org/10.1016/..
?
6
Distilling blockchain requirements for digital investigatio..:
Olukoya, Oluwafemi
Journal of Information Security and Applications. 62 (2021) - p. 102969 , 2021
Link:
https://doi.org/10.1016/..
?
7
Towards using unstructured user input request for malware d..:
Olukoya, Oluwafemi
;
Mackenzie, Lewis
;
Omoronyia, Inah
Computers & Security. 93 (2020) - p. 101783 , 2020
Link:
https://doi.org/10.1016/..
?
8
Security-oriented view of app behaviour using textual descr..:
Olukoya, Oluwafemi
;
Mackenzie, Lewis
;
Omoronyia, Inah
Computers & Security. 89 (2020) - p. 101685 , 2020
Link:
https://doi.org/10.1016/..
?
9
Runtime and design time completeness checking of dangerous ..:
McConkey, Ryan
;
Olukoya, Oluwafemi
McConkey , R & Olukoya , O 2024 , ' Runtime and design time completeness checking of dangerous android app permissions against GDPR ' , IEEE Access , vol. 12 . https://doi.org/10.1109/ACCESS.2023.3347194. , 2024
Link:
https://pure.qub.ac.uk/e..
?
10
Voice spoofing detection for multiclass attack classificati..:
Boyd, Jason
;
Fahim, Muhammad
;
Olukoya, Oluwafemi
Boyd , J , Fahim , M & Olukoya , O 2023 , ' Voice spoofing detection for multiclass attack classification using deep learning ' , Machine Learning with Applications , vol. 14 , 100503 . https://doi.org/10.1016/j.mlwa.2023.100503. , 2023
Link:
https://pure.qub.ac.uk/e..
?
11
Nation-state threat actor attribution using fuzzy hashing:
Kida, Michal
;
Olukoya, Oluwafemi
Kida , M & Olukoya , O 2023 , ' Nation-state threat actor attribution using fuzzy hashing ' , IEEE Access , vol. 11 , pp. 1148-1165 . https://doi.org/10.1109/ACCESS.2022.3233403. , 2023
Link:
https://pure.qub.ac.uk/e..
?
12
Assessing frameworks for eliciting privacy & security requi..:
Olukoya, Oluwafemi
Olukoya , O 2022 , ' Assessing frameworks for eliciting privacy & security requirements from laws and regulations ' , Computers & Security , vol. 117 , 102697 . https://doi.org/10.1016/j.cose.2022.102697. , 2022
Link:
https://pure.qub.ac.uk/e..
?
13
Distilling blockchain requirements for digital investigatio..:
Olukoya, Oluwafemi
Olukoya , O 2021 , ' Distilling blockchain requirements for digital investigation platforms ' , Journal of Information Security and Applications , vol. 62 , 102969 . https://doi.org/10.1016/j.jisa.2021.102969. , 2021
Link:
https://pure.qub.ac.uk/e..
?
14
Towards using unstructured user input request for malware d..:
Olukoya, Oluwafemi
;
Mackenzie, Lewis
;
Omoronyia, Inah
http://eprints.gla.ac.uk/211314/7/211314.pdf. , 2020
Link:
http://eprints.gla.ac.uk..
?
15
Security-oriented view of app behaviour using textual descr..:
Olukoya, Oluwafemi
;
Mackenzie, Lewis
;
Omoronyia, Inah
http://eprints.gla.ac.uk/205065/7/205065.pdf. , 2020
Link:
http://eprints.gla.ac.uk..
1-15