Adetokunbo Makanju

Orcid: 0009-0007-8523-9828

According to our database1, Adetokunbo Makanju authored at least 27 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ADVENT: Attack/Anomaly Detection in VANETs.
CoRR, 2024

2023
Exploring Real-Time Malicious Behaviour Detection in VANETs.
Proceedings of the Int'l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2023

2022
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support.
J. Cybersecur. Priv., May, 2022

Exploring Realistic VANET Simulations for Anomaly Detection of DDoS Attacks.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

Implementation of a Decentralized Traffic Congestion Avoidance Mechanism for VANETs.
Proceedings of the 12th ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications on ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2022

2020
SIMBA: An Efficient Simulator for Blockchain Applications.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

2019
Vulnerability assessment of machine learning based malware classification models.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

2017
Diversification of Autonomous Vehicle Driving Behavior.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Anonymous and analysable web browsing.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

On evolutionary computation for moving target defense in software defined networks.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

2016
Deep parallelization of parallel FP-growth using parent-child MapReduce.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2013
Investigating event log analysis with minimum apriori information.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

2012
A Lightweight Algorithm for Message Type Extraction in System Application Logs.
IEEE Trans. Knowl. Data Eng., 2012

Spatio-temporal decomposition, clustering and identification for alert detection in system logs.
Proceedings of the ACM Symposium on Applied Computing, 2012

Interactive learning of alert signatures in High Performance Cluster system logs.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

2011
Robust learning intrusion detection for attacks on wireless networks.
Intell. Data Anal., 2011

Storage and retrieval of system log events using a structured schema based on message type transformation.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

A next generation entropy based framework for alert detection in system logs.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

System State Discovery Via Information Content Clustering of System Logs.
Proceedings of the Sixth International Conference on Availability, 2011

2010
An Evaluation of Entropy Based Approaches to Alert Detection in High Performance Cluster Logs.
Proceedings of the QEST 2010, 2010

Fast entropy based alert detection in super computer logs.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2010), Chicago, Illinois, USA, June 28, 2010

2009
Clustering event logs using iterative partitioning.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

2008
LogView: Visualizing Event Log Clusters.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

Information Retrieval in Network Administration.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

NetPal: a dynamic network administration knowledge base.
Proceedings of the 2008 conference of the Centre for Advanced Studies on Collaborative Research, 2008

Adaptabilty of a GP Based IDS on Wireless Networks.
Proceedings of the The Third International Conference on Availability, 2008

2007
A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007


  Loading...