Abubakar Bello

Orcid: 0000-0002-4778-2113

According to our database1, Abubakar Bello authored at least 12 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Ensemble learning based anomaly detection for IoT cybersecurity via Bayesian hyperparameters sensitivity analysis.
Cybersecur., December, 2024

A Federated Learning Anomaly Detection Approach for IoT Environments.
Proceedings of the Second International Conference on Advances in Computing Research, 2024

An Assessment of the Cyber Security Challenges and Issues Associated with Cyber-Physical Power Systems.
Proceedings of the Second International Conference on Advances in Computing Research, 2024

2023
Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks.
Future Internet, 2023

Real Time Remote Cardiac Health Monitoring Using IoT Wearable Sensors - A Review.
Proceedings of the Second International Conference on Innovations in Computing Research (ICR'23), 2023

Cloud Resources Usage Prediction Using Deep Learning Models.
Proceedings of the 2023 International Conference on Advances in Computing Research, 2023

2022
A Machine Learning Predictive Model to Detect Water Quality and Pollution.
Future Internet, 2022

BYOD Security: Using Dual Process Theory to Adapt Effective Security Habits in BYOD.
Proceedings of the Future Technologies Conference, 2022

AI and Fake News: A Conceptual Framework for Fake News Detection.
Proceedings of the 2022 International Conference on Cyber Security, 2022

2020
Incorporating Psychology into Cyber Security Education: A Pedagogical Approach.
Proceedings of the Financial Cryptography and Data Security, 2020

Technical and Behavioural Training and Awareness Solutions for Mitigating Ransomware Attacks.
Proceedings of the Applied Informatics and Cybernetics in Intelligent Systems, 2020

2019
A Cloud Based Conceptual IdentityManagement Model for Secured Internetof Things Operation.
J. Cyber Secur. Mobil., 2019


  Loading...