Publications
Journals
- Uduimoh, A. A., Ismaila, I., Osho, O., and Abdulhamid, S. M. (2019). Forensic Analysis of Mobile Banking Applications in Nigeria. i-manager’s Journal of Mobile Applications and Technologies, 6(1), 9-20.
- Shuaib, M., Abdulhamid, S. M., Adebayo, O. S., Osho, O., Idris, I., Alhassan, J. K., and Rana, N. (2019). Whale Optimization Algorithm-Based Email Spam Feature Selection Method Using Rotation Forest Algorithm for Classification. SN Applied Sciences, 1:390, 1-17.
- Osho, O. and Eneche, B. O. (2019). Market Dealers or Perpetrators of Cybercrimes? Investigating Cybercriminal Activities in Information Technology Markets in Nigeria. i-manager’s Journal on Information Technology, 8(1), 11-19, DOI:10.26634/jit.8.1.15715.
- Ayanfeoluwa, O., Osho, O., and Shuaib, M. (2018). Evaluation of Classification Algorithms for Phishing URL Detection. i-manager’s Journal on Computer Science, 6(3), 34-41, DOI:10.26634/jcom.6.3.15698.
- Abdulhamid, S. M., Shuaib, M., Osho, O., Ismaila, I., & Alhassan, J. K. (2018). Comparative Analysis of Classification Algorithms for Email Spam Detection. International Journal of Computer Network and Information Security, 10(1), 60-67. doi: 10.5815/ijcnis.2018.01.07.
- Yisa, V. L., Meshach, B., Osho, O., & Sule, A. (2018). Application of Geo-Location-Based Access Control in an Enterprise Environment. International Journal of Computer Network and Information Security, 10(1), 36-43. doi: 10.5815/ijcnis.2018.01.05.
- Latiff, M. S. A., Chiroma, H., Osho, O., Abdul-Salaam, G., Bakar, A. A., & Herawan, T. (2017). A Review on Mobile SMS Spam Filtering Techniques. IEEE Access, 5, 15650-15666. doi: 10.1109/ACCESS.2017.2666785.
- Osho, O., and Faruna, A. U. (2016). FileSyncer: Design, Implementation, and Performance Evaluation. International Journal of Computer Network and Information Security, 8(11), 32-43.
- Osho, L. O., Abdullahi, M. B., and Osho, O. (2016). Framework for an E-Voting System Applicable in Developing Economies. International Journal of Information Engineering and Electronic Business, 8(6), 9-21.
- Osho, O. and Ohida S. O. (2016) Comparative Evaluation of Mobile Forensics Tools. International Journal of Information Technology and Computer Science, 1, 74-83. doi: 10.5815/ijitcs.2016.01.09.
- Osho, O., and Onoja, A. D. (2015). National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis. International Journal of Cyber Criminology, 9(1), 120-143.
- Olalere, M., Osho, F., Adebayo, O. J., and Ugwu, J. N. (2015). Organization Attendance Record System: Frauds and a Proposed Facial Recognition Technique. International Journal of Innovative Research in Information Security, 2(5), 1-7.
- Abdulhamid, S. M., Abd Latiff, M. S., Madni, S. H. H., and Osho, O. (2015). A Survey of League Championship Algorithm: Prospects and Challenges. Indian Journal of Science and Technology, 8(S3), 101-110.
- Osho, L. O., Abdullahi, M. B., Osho, O., and Alhassan, J. K. (2015). Effective Networking Model for Efficient Implementation of E-Governance: A Case Study of Nigeria. International Journal of Information Engineering and Electronic Business. 7(1), 18-28. doi: 10.5815/ijieeb.2015.01.03.
- Falaye, A. A., Adama, N. V., Osho, O., Ugwuoke, C. U., and Ogunlana, O. G. (2014). Cost-Effective Multimedia E-Learning Application for Nigerian Higher Institutions. Computer Science and Information Technology, 2(2), 79-86. doi: 10.13189/csit.2014.020204.
- Osho, L. O., Sanjay, M., and Osho, O. (2013). A Metric in Global Software Development Environment. Pacific Journal of Science and Technology, 14(2), 213-219.
- Osho, O., Falaye, A. A., and Shafi’i, M. A. (2013). Combating Terrorism with Cybersecurity: The Nigerian Perspective. World Journal of Computer Application and Technology, 1(4), 103-109. doi: 10.13189/wjcat.2013.010401.
- Osho, L. O., Francisca, O., and Osho, O. (2013). Axiomatic Basis for Computer Programming. Universal Journal of Computational Mathematics, 1(3): 67-72. doi: 10.13189/ujcmj.2013.010301.
- Falaye, A. A., Osho, O., Alabi, I. O., Adama, N. V., and Amanambru, V. R. (2013). Secure Authentication for Mobile Banking Using Facial Recognition. IOSR Journal of Computer Engineering, 10(3), 51-59.
- Adebayo, O. S., Mabayoje, M. A., Amit, M., and Osho, O. (2012). Malware Detection, Supportive Software Agents and Its Classification Schemes. International Journal of Network Security & Its Applications, 4(6), 33-49. doi: 10.5121/ijnsa.2012.4603.
Conference
- Osho, O., Obar, I., and Oluyomi, A. (2019). Beware of that Email Attachment, It Could Be a Death Trap! Cyber Secure Nigeria 2019 Conference, Abuja, Nigeria, 54-60.
- Abdulkadir, A., Abdulhamid, S. M., Osho, O., Idris, I., and Alhassan, J. K. (2018). Secure Electronic Medical Records Transmission in Audio using NTRU Cryptosystem with Least Significant Bit Steganographic Technique. Proceedings of the 2018 International Conference on Rural and Elderly Health Informatics (IREHI), Cotonou, Benin.
- Adebayo, O. S., Sulaiman, S. A., Osho, O., Abdulhamid, S. M., and Alhassan, J. K. (2017). Forensic Analysis of Kik Messenger on Android Devices. Proceedings of the 2nd International Engineering Conference (IEC 2017), Minna, Nigeria, 1-8.
- Falaye, A. A., Osho, O., Emehian, M. I. and Ale, S. (2016). Dynamics of SCADA System Malware: Impacts of Smart Grid Electricity Networks and Countermeasures. Proceedings of the International Conference on Information and Communication Technology and Its Applications (ICTA 2016), Minna, Nigeria, 139-145.
- Yisa, V. L., Osho, O., and Soje, I. (2016). Online Social Networks: A Survey of Usage and Risks Experience among University Students in North-Central Nigeria. Proceedings of the International Conference on Information and Communication Technology and Its Applications (ICTA 2016), Minna, Nigeria, 129-133.
- Osho, O. and Adepoju, S. A. (2016). Cybercafés in Nigeria: Curse to the Internet? Proceedings of the International Conference on Information and Communication Technology and Its Applications (ICTA 2016), Minna, Nigeria, 117-123.
- Osho, O., Ajisola, T. H., Onoja, A. D., and Ugwu, J. N. (2016). “Were We Ready in the First Place?”: An Analysis of Cashless Policy Implementation in Nigeria. Proceedings of the International Conference on Computing Research and Innovations, Ibadan, Nigeria, 171-178.
- Osho, O., Onuoha, C. I., Ugwu, J. N., and Falaye, A. A. (2016). E-Commerce in Nigeria: A Survey of Security Awareness and Factors that Influence Acceptance. Proceedings of the International Conference on Computing Research and Innovations, Ibadan, Nigeria, 71-78.
- Osho, O., Yisa, V. L., Ogunleke, O. Y., and Abdulhamid, S. M. (2015). Mobile Spamming in Nigeria: An Empirical Survey. Proceedings of the International Conference on Cyberspace Governance, Abuja, 150-159. doi: 10.1109/CYBER-Abuja.2015.7360503.
- Osho, O., Yisa, V. L., and Jebutu, O. J. (2015). E-Voting in Nigeria: A Survey of Voters’ Perception on Security and Other Trust Factors. Proceedings of the International Conference on Cyberspace Governance, Abuja, 202-211. doi: 10.1109/CYBER-Abuja.2015.7360511.
- Osho, O., Ogunleke, O. Y., and Falaye, A. A. (2014). Frameworks for Mitigating Identity Theft and Spamming through Bulk Messaging. Proceedings of the IEEE 6th International Conference on Adaptive Science and Technology, Ota, Nigeria, 1-6. doi: 10.1109/ICASTECH.2014.7068119.
- Osho, O., Zubair, Y. O., Osho, L. O., and Ojeniyi, J. A. (2014). A Simple Encryption and Decryption System. Proceedings of the International Conference on Science, Technology, Education, Arts, Management and Social Sciences (iSTEAMS Research Nexus), Ado-Ekiti, Nigeria, 77-84.
Book Chapters
- Singh, K., Sidnam-Mauch, E., Iqbal, M., Osho, O., Khan, S., Nelson, P., ... & Bannister, N. (2022). Trust the teachers! Conducting school-based research in a rural middle school when building relationships face-to-face is not possible.
- Osho, O., Oluyomi A., Misra S., Ahuja R., Damasevicius R., Maskeliunas R. (2019). Comparative Evaluation of Techniques for Detection of Phishing URLs. In: Florez H., Leon M., Diaz-Nafria J., Belli S. (eds) Applied Informatics. ICAI 2019. Communications in Computer and Information Science, vol 1051, 385-394. Springer, Cham.
- Osho, O., Musa F. A., Misra S., Uduimoh A. A., Adewunmi A., Ahuja R. (2019). AbsoluteSecure: A Tri-Layered Data Security System. In: Damaševičius R., Vasiljevienė G. (eds) Information and Software Technologies. ICIST 2019. Communications in Computer and Information Science, vol 1078, 243-255. Springer, Cham.
- Osho, O., Mohammed U. L., Nimzing N. N., Uduimoh A. A., Misra S. (2019). Forensic Analysis of Mobile Banking Apps. In: Misra S. et al. (eds) Computational Science and Its Applications – ICCSA 2019. ICCSA 2019. Lecture Notes in Computer Science, vol 11623, 613-626. Springer, Cham.
Technical Papers
- Osho, O., Ojeniyi, J. A., & Abdulhamid, S. M. (2017, November 21). Protecting the Core. GCSC Issue Brief 1: Briefings and Memos from the Research Advisory Group, 99-126.
Conference Proceedings (Editor of)
- Olalere, M., Osho, O., Olaniyi, O. M., Abdulhamid, S. M., Ganiyu, S. O., and Chiroma, H. (2019). Proceedings of the Cyber Secure Nigeria 2019 Conference.
- Osho, O., Abdulhamid, S. M, … Adebayo, O. S. (2018). Proceedings of the 2nd International Conference on Information and Communication Technology and Its Applications (ICTA 2018).
- Salami, H. O., Ikuesan, R. A., Osho, O., Mikail, O. … Ahmad, S. (2017). Proceedings of the International Conference on Information and Communication Technology and Its Applications (ICTA 2016).