Search
Close this search box.

Prof.

SODIYA Adesina Simon 

LinkedIn
Scopus

Short Profile

SODIYA Adesina Simon is a Professor of Computer Science and Information Security, currently in the Department of Computer Science, Federal University of Agriculture, Abeokuta (FUNAAB), Ogun State, Nigeria. He completed his Ph.D in Computer Science in 2004 with a focus on Information Security. He has taught courses in Information Security and other areas of Computer Science at undergraduate and postgraduate levels.

As a pioneer researcher in the field of Information Security in Nigeria, he has over twenty-five years’ experience in conducting high impact research in Cyber Security, Attack/Intrusion Detection, Authentication Systems, Cryptography, Systems’ Security, Privacy Protection, and Security of Distributed Systems. He has supervised six Ph.D. and twenty Masters Students in different areas of Information Security and Computer Science. He is presently serving as Postgraduate External Examiner/Assessor in about five universities locally and internationally. He has published over seventy (80) scholarly articles in local and international journals. He has also presented papers at both local and international conferences, resulting in about twenty papers in referred conference proceedings.

In FUNAAB, he served as Departmental Postgraduate Coordinator between 2008 and 2013 and Acting Head of Department, Computer Science between 2013 and 2015. He is a member of the University Senate and also currently serving many other university academic committees such as Curriculum Committee, College Promotion Assessment Promotion Panel etc. He was the Editor-In-Chief of the Journal of Computer Science and Its Applications between 2011 to 2013 and the Editor-In-Chief of Journal of Information Security, Privacy and Digital Forensic between 2015 to 2018.

In 2010, he won TWAS-AAS-MICROSFT Award for Outstanding Computer Science Researcher living and working in Africa. He has also won several leadership, excellence in Research and professional awards.

As he is a core professional, Sodiya A. S. is a fellow of Nigeria Computer Society and served as Vice-President/Vice Chairman of Computer Professional (Registration council) of Nigeria –CPN between 2015 and 2017. Prof. A. S. Sodiya has been serving as a member of National Executive Council (NEC) of Nigeria Computer Society (NCS) since 2011. He is the immediate past President of Information Technology Systems and Security Professionals (ITSSP). He is a member of International Institute of Electrical and Electronic Engineering (IEEE). He is also a member of two technical committees of International Federation of Information Processing (IFIP) – ICT and Education TC-3 and Security and Privacy Protection in Information Processing Systems (TC-11). He is a member of Global Commission for the Stability of Cyberspace. He is the current Ogun State Technical Adviser for Joint Admission Matriculation Board (JAMB). Sodiya A.S. is the current President of the Nigeria Computer Society (NCS).

Prof. Sodiya is a member of Computer Professionals (Registration Council of Nigeria)–CPN and member of the Governing board of the National Information Technology Development Agency (NITDA). He is currently representing Nigeria Computer Society in the Broadband Implementation committee of the Federal Ministry of Communication and Digital Economy.

Prof. Sodiya is married to Prof. (Mrs.) Comfort I. Sodiya and the marriage is blessed with children.

(a) Ph.D. (Computer Science) – April, 2004
(b) M.Sc. (Computer Science) – March, 1999
(c) MBA (Accounting & Finance) – Sept., 1997
(d) B.Sc. (Hons) Computer Sc./Stat. – Sept., 1992

  • Computer Security, Bio-informatics, Data Mining, Knowledge-Based Systems, Agent development, Information System and Software engineering
  • A non-text attribute watermaking scheme
  • An efficient architecture for preventing and detecting phishing attack
  1. 2018 most Outstanding member, presented by Academia in Information Technology Profession
  2. 2011 TWAS-AAS-MICROSOFT award for outstanding computer scientist working and living in Africa
  3. IGI global Research Excellence award 2011
  4. A fellow of United Nation University (UNU) in conjunction with International Institute of Software Technology (IIST). 4-month Study and Research fellowship at UNIVERSITY OF CALGARY, Calgary, Alberta, Canada. 1st September to 21st December, 2005. Supervised by Prof. Yingxu Wang
  5. A fellow of Nigeria Computer Society (NCS)
  1. Fellow, Nigeria Computer Society (NCS) – (No.:- 02280)
  2. Member, Computer Professionals (Registration Council) of Nigeria (CPN) – (No.:- 2186/2008)
  3. Member, International Institute of Electrical and Electronic Engineering (IEEE) – (No.:- 90296684)
  4. Member, Information Technology Systems and Security Professionals (ITSSP), Nigeria
  5. Member, Academia in Information Technology Profession (AITP)
  • National Conference of Nigeria Computer Society held in Ibadan, Oyo State, July, 2018
  • IT Assembly of Computer Professionals (Registration Council) (CPN) of Nigeria held in Abuja, June, 2018
  • IT Assembly of Computer Professionals (Registration Council) (CPN) of Nigeria held in Calabar, June, 2017
  • IT Assembly of Computer Professionals (Registration Council) (CPN) of Nigeria held in Calabar, June, 2015
  • IT Assembly of Computer Professionals (Registration Council) (CPN) of Nigeria held in Kaduna, June, 2016
  • IT Assembly of Computer Professionals (Registration Council) (CPN) of Nigeria held in Calabar, June, 2017
  • IT Assembly of Computer Professionals (Registration Council) (CPN) of Nigeria held in Calabar, June, 2015
  • 1st International Conference on Advanced Computerised Systems and Emerging Technologies (ICACSET 2014), organized by Department of Computer Science, Babcock University in conjunction with Nigeria Computer Society, held at Babc ock University, Ilisan, Ogun State.
  • International Conference of Nigeria Computer Society held in Enugu, Enugu State. July, 2014
  • Key Competencies in Informatics and ICT (KEYCIT), 2014 IFIP TC3 Annual Conference, held in Potsdam, Germany.
  • IT Assembly of Computer Professionals (Registration Council) (CPN) of Nigeria held in Abuja, June, 2014
  • International Conference of Nigeria Computer Society held in Iloko-Ijesa, Oyo State. July, 2013
  • Annual Computer Security Applications Conference (ACSAC) held in Orlando, USA – December 2012.
  • International Conference of Nigeria Computer Society held in Uyo, Akwa-Ibom State. July, 2012
  • International Conference of Nigeria Computer Society held in Abuja. July, 2011
  • 8th International Conference on Information Technology: New Generations, Las Vegas, USA,
  • IT Assembly of Computer Professionals (Registration Council) (CPN) of Nigeria held in Abuja, June, 2011
  • AAS-icipe-TWAS-ROSSA Conference on ‘Climate Change and Food Security’, in Nairobi, Kenya. November, 2011
  • “Education: Issues in ICT deployment”, lead paper presentation at the 1st International Conference on Contemporary Issues in Teachers Education     In Sub-Saharan Africa organized by Colleges of Education Academic Staff, Federal College of Education, Abeokuta, Ogun State. March, 2011.
  • “Towards efficient implementation of health informatics”, lead paper presention at 1st International Conference on ICT and Health delivery organized by Colleges of Health Technology, Ilese, Ogun State. February, 2011.
  • International Conference of Nigeria Computer Society held in Asaba, Delta State. July, 2010. Paper read:- “An Agent-Based Framework For Secure E-Voting”
  • “Using ICT as a tool for social economic renaissance”, Lead paper presentation at the the 2nd National Conference of Faculty of Information And Communication Technology, Osun State Polytechnic, Osun State, April, 2010.
  • IT Assembly of Computer Professionals (Registration Council) (CPN) of Nigeria held in Abuja. June, 2009
  • International Conference of Nigeria Computer Society (NCS) Conference, Abeokuta. June, 2008 Paper read:- “A Framework for Mixed Cropping Decision Support System”
  • Informing Science conference, Florida, USA , 2006
  • Computer Association Of Nigeria Conference, Abuja June, 2002
  • Computer Association Of Nigeria Conference, Benin June, 1999
  • Computer Association Of Nigeria Conference, Abuja June, 1998
  • Computer Association Of Nigeria Conference, Calabar, June, 1997

THESIS/DISSERTATION

  1. SODIYA, A. S. (1992). “Law Office Automation”, B.Sc. project, Faculty of Science, Ogun State University, Ago-Iwoye, Nigeria.
  2. SODIYA, A. S. (1998). “Impact of Computerisation of Banking Operation on Customers’ Services”, MBA project, Faculty Ogun State University, Ago- Iwoye, Nigeria.
  3. SODIYA, A. S. (1999). “Forecasting Enrolment using Fuzzy Time Series – A case Study of University of Agriculture, Abeokuta.”, MSc. Dissertation, University of Lagos, Nigeria.
  4. SODIYA, A. S. (2004). “A New Combined Strategy To Intrusion Detection”, PhD Thesis, University of Agriculture, Abeokuta, Nigeria.

PUBLISHED ARTICLES IN LEARNED JOURNALS

  • Sodiya, A. S., and Longe, H. O. D. (2004). “Intrusion Detection Systems: The problems, Prospects and the Way Forward”, Journal of Applied Computer Science, Vol. 12, No. 1, pp 83-95, ISSN: 1507-0360, published by Technical University of Lodz, Poland. Available online at http:/www.ics.p.lodz.pl/jacs.html
  • Sodiya, A. S. and Longe, H. O. D. (2004). “Critical Analysis of Current Anomaly-based Intrusion Detection Techniques”, Journal of Computer Science and Its Applications, An International Journal of the Nigeria Computer Society, Vol. 10, No. 1, pp 64-74, ISSN: 2006-5523, published by Nigeria Computer Society.
  • Sodiya, A. S., Longe, H. O. D., and Akinwale, A. T. (2004). “A New Two-tiered Strategy To Intrusion Detection”, International Journal of Information Management and Computer Security, Vol. 12, No 1, pp 27-43, ISSN: 0968-5227, published by Emerald, UK. Available online at www.emeraldinsight.com/imcs.htm
  • Sodiya, A. S., Longe, H.O.D. and Ibrahim, S. A. (2005). “Data Mining Based Intelligent Equipment Maintenance In Telecommunication Network”, Journal of Applied Computer Science, Vol. 13, No. 1, pp 29-38, ISSN: 1507-0360, published by Technical University of Lodz, Poland. Available online at http:/www.ics.p.lodz.pl/jacs.html
  • Sodiya, A. S. and Longe, H. O. D. (2005). “An Improved Two-Tiered Strategy To Intrusion Detection”, International Journal of Information Management and Computer Security, Vol. 13, No. 3, pp 235-243, ISSN: 0968-5227, published by Emerald, UK. Available online at www.emeraldinsight.com/imcs.htm
  • Sodiya, A. S., Longe, H. O. D., and Akinwale, A. T. (2005). “Maintaining Privacy in Anomaly-based Intrusion Detection System”, International Journal of Information Management and Computer Security, Vol. 13, No. 1, pp 72-80, ISSN: 0968-5227, published by Emerald, UK. Available online at www.emeraldinsight.com/imcs.htm
  • Ogunde A. O., Folorunso O. and Sodiya A. S. (2005). “An Improved Algorithm For Mining The Top-k Frequent Itemset With Minimum Length M In Transaction Databases”, International Journal of Agricultural Sciences, Science, Environment and Technology (ASSET), Vol. 4, No. 1., pp 57-73, ISSN 1595-9694, Published by University of Agriculture, Abeokuta, Nigeria.
  • Sodiya, A. S., Ibrahim, S. A., and Ajayi O. B. (2006). “Towards Building Secure Software Products”, Journal of Issues in Informing Science and Information Technology, ISSN: 1547-7684, Vol. 3, 2006, pp 635-646, ISSN: 1547-7684, published by Informing Science Institute, USA. Available online at http://IIST.org
  • Sodiya A. S. (2006): “Multi-level and Secured Agent-Based Intrusion Detection System”, Journal of Computing and Information Technology, Vol. 14, No. 3, pp 217-223, ISSN: 1330-1136, published by University of Zagreb, Croatia. Available online at www.cit.srce.hr
  • Sodiya A. S. (2007): “A Natural Language Architecture”, Journal of Computing and Information Technology, Vol. 15, No. 1, pp 25-32, ISSN: 1330-1136, published by University of Zagreb, Croatia. Available online at www.cit.srce.hr 
  • Sodiya, A. S., Onashoga, S. A., and Oladunjoye, B. A. (2007). “Threat Modeling Using Fuzzy Logic Paradigm”, Journal of Issues in Informing Science and Information Technology, USA, Vol. 4, 2007, pp 53-61, published by Informing Science Institute, USA. Available online at http://IIST.org
  • Sodiya, A. S., Longe, H. O. D., Onashoga, S. A., Awodele, O. and Omotosho, L. O. (2007). “An Improved Assessment of Personality Traits In Software Engineering”, Interdisciplinary Journal of Information, Knowledge and Management, Vol. 2, pp 163-177, IISN: 1555-1229, published by Informing Science Institute, USA. Available online at http://IJIKM.org
  • Sodiya, A. S., Ikuomola, A. J. and Adeniran, O. J. (2007). “An Expert System-based Site Security Officer”, Journal of Computing and Information Technology, Vol. 15, No. 3, 2007, pp 227-235, ISSN: 1330-1136, published by University of Zagreb, Croatia. Available online at www.cit.srce.hr
  • Sodiya, A. S., Longe, H. O. D., and Fasan, O. M. (2008). “Software Security Risk Analysis Using Fuzzy Expert System”, INFOCOMP: Journal of Computer Science, Vol. 7, No. 3, pp 70-77, ISSN: 1807-4545, published by Universidade Federal de Lavras, Brazil. Available online at www.dcc.ufla.br/infocomp
  • Sodiya, A. S. and Onashoga, S. A. (2009). “Components-based Access Control Architecture”, Journal of Issues in Informing Science and Information Technology, USA, Vol. 6, 2009, pp 53-61, ISSN: 1547-7684, published by Informing Science Institute. Available online at http://IIST.org
  • Onashoga, S. A., Sodiya, A. S., and Omotoso, B. G. (2009). “A Tabu Search Algorithm for Consumer Financial Optimization System”, Journal of Computer Science and Its Applications, Vol. 16, No. 1, June, 2009, ISSN: 2006-5523, published by Nigeria Computer Society.
  • Sodiya, A. S., Onashoga, S. A. and Adepoju, B. T. (2009). “Evaluating the Impact of Intrusions on Computer System”, Journal of Computer Science and Its Applications, Vol. 16, No. 1, June, 2009,  ISSN: 2006-5523, published by Nigeria Computer Society, Nigeria.
  • * Onashoga, S. A., Akinde, D. A. and Sodiya, A. S., (2009). “A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems ”,  Journal of Issues in Informing Science and Information Technology, USA, Vol. 6, 2009, pp 669-682, published by Informing Science Institute, USA. Available online at http://IIST.org
  • Sodiya, A. S., Akinwale, A. T., Okeleye, S. A. and Emmanuel, J. A. (2010). “A Decision Support System for Intercropping”, International Journal of Decision Support System Technology, 2, No. 3, 2010, pp. 51-66., ISSN: 1941-6296, published by Information Resources Management Association, USA. Available online at www.igi-global.com/ijdsst
  • Elugbadebo, O. J., Sodiya, A. S. and Folorunso, O. (2010). “A Multi-dimensional Constraint Gradient Mining”, Journal of Natural Science, Technology (JNSET), Vol 8, No. 1, ISSN: 1595-9694, published by University of Agriculture, Abeokuta, Nigeria.
  • Sodiya, A. S., Folorunso, O. and Ogunderu, O. P. (2011). “An Improved Semi-Global Algorithm for Masquerade Detection”, International Journal of Network Security, 13, No. 1, 2011, pp. 31-40, ISSN: 1816-353X, published by National Chung Hsing University, Taiwan. Available online at http://ijns.femto.com.tw/
  • Sodiya, A. S., Folorunso, O., Komolafe, P. A. and Ogunderu, O. P. (2011). “Preventing Authentication Systems from Keylogging Attacks”, International Journal of Privacy and Security, 7, No. 2, pp 3-27, ISSN: 1553-6548, published by Information Resource Management Association, USA. http://jips.cob.tamucc.edu/issues.htm
  • Sodiya, A. S., Onashoga, S. A., Afolorunso A. A. and Ogunderu, O. P. (2011). “A Countermeasure Algorithm For Password Guessing Attack”, International Journal of Information and Computer Security, 4, No. 4, ISSN: 1744-1765, published by Inderscience, Switzerland. http://www.inderscience.com/browse/index.php?journalID=151
  • Onashoga, S. A., Sodiya, A. S., Akinwale, A. T. and Falola, O. E. (2011). “Mining of prevailent ailments in health database using fp-growth algorithm”, International Journal of Data Engineering, 2, No. 2, ISSN: 2180-1274, published by Computer Science Press (CSC Journals), Malaysia. Available online a http://cscjournals.org/csc/description.php?JCode=IJDE
  • Adewole, A. P., Sodiya, A. S. and Arowolo, O. A. (2011). “A Receipt-free Multi-Authority E-Voting System”, International Journal of Computer Applications, Vol. 30, No. 6, pp 15-23, published by Foundation of Computer Science, New York, USA.
  • Ogunde A. O., Folorunso O., Sodiya A. S., Oguntuase, J. A. and Ogunleye, G. O. (2011). “An improved cost models for agent-based    association rule mining in distributed databases”,  Anale. Seria Informatica,  Vol. IX fasc. 1, pp 231– 250, published by “Tibiscus” University, Romania.
  • Ogunde, A .O., Folorunso, O., Sodiya, A. S. and Ogunleye, G. O. (2011). ”A Review of Some Issues and Challenges in Current Agent-Based Distributed Association Rule Mining”, Asian Journal of Information Technology, Vol. 10, No. 02, 2011, pg 84-95, published by Medwell Journal, Pakistan.
  • Orunsolu, A. A., Sodiya, A. S. and Oyekan, D. F. (2012). “Destructible Password Functionality Authentication Protocol”, African Journal of Computing and ICTs, Vol. 5, No. 2, ISSN: 2006-1781, published by IEEE Nigeria Computer Chapter. Available online at http://www.ajocict.net
  • Onashoga, S. A., Sodiya, A. S., and  folorunso, A.(2012). “A One-time Sever-specific Password Authentication Scheme”, Journal of Computing and Information Technology, 20, No. 2, pp 85-93, ISSN: 1330-1136, published by University of Zagreb, Croatia. Available online at www.cit.srce.hr
  • Akinwale, A. T., Shonubi, A. J., Adekoya, A. F., Sodiya, A. S and Mewomo, O. T. (2013). “Ontology of Input Validation Attack on Web Application”, Business Informatics, 4(30), pp 11-23, published by Wroclaw University of Economics, Poland. Available online at http://www.wydawnictwo.ue.wroc.pl/o_wydawnictwie/63,informatyka_ekonomiczna_business_informatics.html
  • Ikuomola, A. J., Sodiya, S., Akinwale, A. T. and Aborisade, D. O. (2013). “An Improved Cost-Sensitive Intrusion Response Model”, Journal of Information Assurance and Security, Vol. 8, No. 4, pp 147-155, published by Machine Intelligence Research Labs., USA.
  • Aborisade, D. O., Sodiya, S. and Ikuomola, A. J. (2013). “A Survivability Architecture for Object-Oriented Software Systems”, Journal of Information Assurance and Security, Vol. 8, No. 4, pp 167-176, published by Machine Intelligence Research Labs., USA.
  • Sodiya, S. and Orunsolu, A. A. (2013). “An Adaptive Hierarchical Access Control Architecture Using Compliance Variance”, Anale. Seria Informatica, Vol. 11, No. 2, pp 109-115, published by “Tibiscus” University, Romania.
  • Onashoga, A. S., Sodiya, A. S., Mewomo, O. T. and Fadeyi, I. M. (2013). “An Efficient Broadcast Encryption for Secure Group Communication”, INFOCOM Journal of Computer Science, Vol. 12, No. 2, pp 45-55, published by Universidade Federal de Lavras, Brazil. Available online at www.dcc.ufla.br/infocomp
  • Sodiya, A. S., Falana, O. J., Onashoga, S. A. and Badmus, B. S. (2014). “Adaptive Neuro-Fuzzy System for Malware Detection”, Journal of Computer Science and Its Applications, Vol. 21, No. 2, pp 20-31, published by Nigeria Computer Society, Nigeria.
  • Shonubi, A. J., Adekoya, A. F., Sodiya, A. S., and Mewomo, O. T. (2014). “An Ontology-based Intrusion Patterns Classification System”, Journal of Computer Science and Its Applications, Vol. 21, No. 2 , pp 32-46, published by Nigeria Computer Society, Nigeria.
  • Adejinmi, A. O. and Sodiya, A. S. (2014). “Context Dependent Threat Access Control System”, Journal of Computer Science and Information Technology, Vol. 2, No. 3&4 , pp 83-105, published by American Research Institute for Policy Development, USA. Available at  http://dx.doi.org/10.15640/jcsit.v2n3-4a5
  • Sodiya, A. S., Onashoga, S. A., Solarin-soda, T. and Falana, O. J. (2015). “A Hybrid Approach to Masquerade Detection”, Accepted for publication, Journal of Computer Science and Its Applications, published by Nigeria Computer Society, Vol. 25, No. 1.
  • Onashoga, S. A., Abayomi-Alli, O. O., Sodiya, A. S. and Ojo, D. A. (2015). “An Adaptive and Collaborative Server-Side SMS Spam Filtering Scheme Using Artificial Immune System”, Information Security Journal: A Global Perspective, Volume 24, 2015 – Issue 4-6, pp 133 – 145, published by Taylor and Francis.
  • Ogunde, A. O., Folorunso, O. and Sodiya, A. S. (2015). A partition enhanced mining algorithm for distributed association rule mining systems, Egyptian Informatics Journal, (2015) 16, pp 297–307, published by Elsevier. Available at http://dx.doi.org/10.1016/j.eij. 2015.06.006
  • Sodiya, A. S. and Adegbuyi, B. (2015). A Framework for Protecting Users’ Privacy in the Cloud, International Journal of Information Security and Privacy, USA. Vol. 4, No. 10, pp 1 – 11. DOI: 10.4018/IJISP. 2016100102.
  • Sodiya, A. S. and Adesegun, O. (2017). A Methamorphic Malware Detection System, International Journal of Information Security, Privacy and Digital Forensic, published by Nigeria Computer Society, Vol. 6, No. 2.
  • Orunsolu, A. A, Sodiya, A. S., Akinwale, A. T. and Olajuwon, B. (2017). A Users’ Awareness Study and Influences of Social-Demography Perception of Anti-Phishing Security Tips, Acta Informatica Pragensia, published by University of Economics, Prague, Czech republic, Vol. 7, No. 2, pp138-151.
  • Orunsolu, A., Afolabi, O., Sodiya, A. S. and Akinwale, A. T. (2017). An Anti-Phishing Scheme for Secured Web Transaction, International Journal of Electronics and Information Engineering, published by National Chung Hsing University, Taiwan, Vol. 6, No. 2.

PAPERS IN REFEREED CONFERENCE PROCEEDINGS

  • 45. Sodiya, A. S., Ajayi, O. B. and Oketayo, E. O. (2000). “Information Security for users of E-commerce”, Proceedings of the 16th National  Conference of Computer Association of Nigeria (COAN), O. Uwadia, H. O. D. Longe and A. D. Akinde (Eds)  pp 173-179, published by COAN.
  • Sodiya, A. S. and Folorunso, O. (2000). “Developing An Issue-based Decision Support System For Government Cabinet”, Proceedings of the 16th National Conference of Computer Association of Nigeria (COAN), O. Uwadia, H. O. D. Longe and A. D. Akinde (Eds) pp 221-232, published by COAN.
  • Sodiya, A. S., Ajayi, O. B. and Ibrahim, S. A. (2004). “The State of Information Security in South-Western Nigerian Educational Institutions”, Proceeding of 1st International Conference on Science and National Development, C. Eromosele, T. A. Arowolo, T. O. S. Popoola, I. A. Akpan (Eds), pp 38-45, ISBN: 978-2783-85-4, published by College of Natural Sciences, University of Agriculture, Abeokuta, Nigeria.
  • Sodiya, A. S., Onashoga, S. A., Dansu, B. M. and Adeleye, B. A. (2007). “An Assessment of Knowledge Management Capabilities of Nigerian Banking Institutions”, Proceeding of 2nd International Conference on Science and National Development, C. Eromosele, T. and T. O. S. Popoola (Eds), pp 132-137, ISBN: 978-2783-85-4, published by College of Natural Sciences, University of Agriculture, Abeokuta, Nigeria.
  • Onashoga, S. A., Sodiya, A. S., and Adekoya, A. O. (2007). “An e-Marketplace for UNAAB Campala”, Proceeding of 2nd International `Conference on Science and National Development, C. Eromosele, T. and T. O. S. Popoola (Eds), pp 138-145, ISBN: 978-2783-85-4, published by College of Natural Sciences, University of Agriculture, Abeokuta, Nigeria.
  • Sodiya, A. S., Akinwale A. T. and Onashoga, S. A. (2008). “A Framework for Mixed Cropping Decision Support System”, Proceedings of the 22nd National Conference of Nigeria Computer Society (NCS), O. Folajinmi and I. K. Oyeyinka (Eds) Vol. 19, pp 181-186, published by NCS.
  • Sodiya, A. S., Onashoga, S. A., Rosanwo, O. D. and Lawal, B. H. (2008). “Managing ICT Infrastructure in Higher Educational Institutions”, Proceeding of 3rd International Conference on Science and National Development, E. Asiribo and J. A. Oguntuase (Eds), pp 60-67, ISBN: 978-2783-85-4, published by College of Natural Sciences, University of Agriculture, Abeokuta, Nigeria.
  • Onashoga, S. A., Sodiya, A. S., and Akinlawon O. (2008). “An Analysis of performance of Employed I.T. Graduates”, Proceeding of 3rd International Conference on Science and National Development, O. E. Asiribo and J. A. Oguntuase (Eds), pp 68-73, ISBN: 978-2783-85-4, published by College of Natural Sciences, University of Agriculture, Abeokuta, Nigeria.
  • Orunsolu, A. A., Sodiya, A. S., Onashoga, S. A. and Afolorunso, A. A. (2010). “An Agent-Based Framework For Secure E-Voting”, Proceedings of the 23rd National Conference of Nigeria Computer Society (NCS), C. O. Uwadia, G. A. Aderounmu, Y. O. Folajinmi and V. Ejiofor (Eds) Vol. 21, pp 229-238, published by NCS.
  • Ikuomola, A. J., Sodiya, A. S. and Nehinbe J. O. (2010). “A Framework for Collaborative, Adaptive and Cost Sensitive Intrusion Response System”, Proceedings of Institute of Electrical and Electronics Engineers (IEEE), 1-4. Published by University of Essex, UK. ISSN: 978-1-4244-9029-5. Available at http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5606485&url
  • Sodiya, A. S., Onashoga, S. A. and Adelani, D. I. (2011). “A Secured E-voting Architecture”, Proceedings of the 8th International Conference on Information Technology: New Generations, Las Vegas, USA, Latifi (Ed), pp 342-347, published by international Institute of Electrical and Electronics Engineering (IEEE).
  • Onashoga, S. A. and Sodiya, A. S. (2011). “A Confidential Electronic Result Transfer Using a Hybrid XML Security Scheme”, Proceedings of the 8th International Conference on Information Technology: New Generations, Las Vegas, USA, Latifi (Ed), pp 397-402, published by international Institute of Electrical and Electronics Engineering (IEEE).
  • Ogunde A. O., Folorunso O., Sodiya A.  S., and Oguntuase, J. A.  (2011). “Towards an adaptive multi-agent architecture for association rule mining in distributed databases”. In IEEE Xplore database Adaptive Science and Technology (ICAST), 2011, 3rd IEEE International Conference on Adaptive Science and Technology, Pg 31 – 36.
  • Ogunde, A.O., Folorunso, O., and Sodiya, A. S. (2012). On the Adaptivity of Distributed Association Rule Mining Agents. Fourth International Conference on Adaptive and Self-Adaptive Systems and Applications, Adaptive 2012 Conference, IARIA July 22nd – 27th , Nice, France, www.iaria.org/conferences, Pg 69-74.
  • Ikuomola, A. J. and Sodiya, A. S. (2012). “A Credible Cost-Sensitive Model For Intrusion Response Selection”, Proceedings of Institute of Electrical and Electronics Engineers (IEEE), 222 – 227. Available at http://ieeexplore.ieee.org/application/mdl/mdlconfirmation.jsp?arnumber=6412406&icp=false
  • Agholor, S. and Sodiya, A. S. (2013). “An Assessment of Feedback Mechanism of Some Selected Websites Towards Improved End-users’ Password Selection”, Proceedings of the 23rd National Conference of Nigeria Computer Society (NCS), O. Uwadia, G. A. Aderounmu, Y. and A. S. Sodiya Vol. 24, published by NCS.
  • Aborisade, D. A., Reich, C., Sodiya, A. S. and Akinwale, A. T. (2016). “Call Response Rate as Baseline for Detecting DRDoS Attack in Cloud Database Service”, 5th Conference on Software Technology and Processes (STeP 2016) held on 3th May, 2016 at Hochschule Furtwangeng University, Germany. Pp 49 – 60. www.degruyter.com, http://www.step2016.de
  • Onuri, E., Sodiya, A. S. , Ebusiwa, O. and Akande, O. (2016). “Generic Prediction of Malaria Treatment Outcomes Using Big Data Analytics”, Proceedings of 26th National Conference of Nigeria Computer Society (NCS), Abuja.
  • Adesanya, M. B., Sodiya, A. S. and Onashoga, S. A. (2016). A combined scheme for credit card fraud detection, Proceedings of the 2nd International Conference on Intelligent Computing and Emerging Technologies, held between 20 – 22 November, 2016 at Babcock University, Ilisan, Ogun State.
  • Agholor, S., Sodiya, A. S. and Aborisade, D. A. (2016). A comparative analysis of cybersecurity laws of selected countries, Proceedings of the 2nd International Conference on Intelligent Computing and Emerging Technologies, held between 20 – 22 November, 2016 at Babcock University, Ilisan, Ogun State.
  • Okoro, U. R., Sodiya, A. S., Awodele O. and Kuyoro, O. S, D. A. (2016). A Game Ontology Model For Acquiring Business Skills, Proceedings of the 2nd International Conference on Intelligent Computing and Emerging Technologies, held between 20 – 22 November, 2016 at Babcock University, Ilisan, Ogun State.
  • Orunsolu A. A. and Sodiya, A. S. (2017). An Anti-Phishing Kit Scheme for Secure Web Transactions, Proceedings of the 3rd International Conference on Information Systems and Privacy, Portugal held between 19 – 21 February, 2017.
  • Orunsolu A. A., Sodiya, A. S. and Alaran A. A. (2018). An Anti-Phishing Kit Scheme for Secure Web Transactions, Proceedings of the 27th National Conference of Nigeria Computer Society, Ibadan, Oyo State held between 17 – 18 July, 2018.

Last Updated:

Times Higher Education (THE)
World University Rankings (WUR) for 2024

rANKING OF UniversitIES of Agriculture

1ST IN aFRICA | 7TH gLOBALLY

30th Convocation Ceremonies

Award of First Degree to deserving graduands

Days
Hours
Minutes
Seconds