default search action
Adetokunbo Makanju
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Hamideh Baharlouei, Adetokunbo Makanju, Nur Zincir-Heywood:
Evaluating the Robustness of ADVENT on the VeReMi-Extension Dataset. CNSM 2024: 1-7 - [i1]Hamideh Baharlouei, Adetokunbo Makanju, Nur Zincir-Heywood:
ADVENT: Attack/Anomaly Detection in VANETs. CoRR abs/2401.08564 (2024) - 2023
- [c23]Hamideh Baharlouei, Adetokunbo Makanju, Nur Zincir-Heywood:
Exploring Real-Time Malicious Behaviour Detection in VANETs. DIVANet 2023: 1-8 - 2022
- [j3]Haozhe Zhou, Amin Milani Fard, Adetokunbo Makanju:
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support. J. Cybersecur. Priv. 2(2): 358-378 (2022) - [c22]Aishik Sanyal, Adetokunbo Makanju, Nur Zincir-Heywood:
Implementation of a Decentralized Traffic Congestion Avoidance Mechanism for VANETs. DIVANet 2022: 3-8 - [c21]Hamideh Baharlouei, Adetokunbo Makanju, Nur Zincir-Heywood:
Exploring Realistic VANET Simulations for Anomaly Detection of DDoS Attacks. VTC Spring 2022: 1-7 - 2020
- [c20]Seyed Mehdi Fattahi, Adetokunbo Makanju, Amin Milani Fard:
SIMBA: An Efficient Simulator for Blockchain Applications. DSN (Supplements) 2020: 51-52
2010 – 2019
- 2019
- [c19]Godwin Raju, Pavol Zavarsky, Adetokunbo Makanju, Yasir Malik:
Vulnerability assessment of machine learning based malware classification models. GECCO (Companion) 2019: 1615-1618 - 2017
- [c18]Adetokunbo Makanju, Nur Zincir-Heywood, Shinsaku Kiyomoto:
On evolutionary computation for moving target defense in software defined networks. GECCO (Companion) 2017: 287-288 - [c17]Tran Phuong Thao, Adetokunbo Makanju, Ayumu Kubota:
Anonymous and analysable web browsing. IPCCC 2017: 1-8 - [c16]Adetokunbo Makanju, Shinsaku Kiyomoto:
Diversification of Autonomous Vehicle Driving Behavior. VTC Fall 2017: 1-5 - 2016
- [c15]Adetokunbo Makanju, Zahra Farzanyar, Aijun An, Nick Cercone, Zane Zhenhua Hu, Yonggang Hu:
Deep parallelization of parallel FP-growth using parent-child MapReduce. IEEE BigData 2016: 1422-1431 - 2013
- [c14]Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
Investigating event log analysis with minimum apriori information. IM 2013: 962-968 - 2012
- [j2]Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
A Lightweight Algorithm for Message Type Extraction in System Application Logs. IEEE Trans. Knowl. Data Eng. 24(11): 1921-1936 (2012) - [c13]Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
Interactive learning of alert signatures in High Performance Cluster system logs. NOMS 2012: 52-60 - [c12]Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios, Markus Latzel:
Spatio-temporal decomposition, clustering and identification for alert detection in system logs. SAC 2012: 621-628 - 2011
- [j1]Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
Robust learning intrusion detection for attacks on wireless networks. Intell. Data Anal. 15(5): 801-823 (2011) - [c11]Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
System State Discovery Via Information Content Clustering of System Logs. ARES 2011: 301-306 - [c10]Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
A next generation entropy based framework for alert detection in system logs. Integrated Network Management 2011: 626-629 - [c9]Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
Storage and retrieval of system log events using a structured schema based on message type transformation. SAC 2011: 528-533 - 2010
- [c8]Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
Fast entropy based alert detection in super computer logs. DSN Workshops 2010: 52-58 - [c7]Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
An Evaluation of Entropy Based Approaches to Alert Detection in High Performance Cluster Logs. QEST 2010: 69-78
2000 – 2009
- 2009
- [c6]Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
Clustering event logs using iterative partitioning. KDD 2009: 1255-1264 - 2008
- [c5]Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
Adaptabilty of a GP Based IDS on Wireless Networks. ARES 2008: 310-318 - [c4]Ashley George, Adetokunbo Makanju, Evangelos E. Milios, Nur Zincir-Heywood, Markus Latzel, Sotirios Stergiopoulos:
NetPal: a dynamic network administration knowledge base. CASCON 2008: 20 - [c3]Ashley George, Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
Information Retrieval in Network Administration. CNSR 2008: 561-568 - [c2]Adetokunbo Makanju, Stephen Brooks, Nur Zincir-Heywood, Evangelos E. Milios:
LogView: Visualizing Event Log Clusters. PST 2008: 99-108 - 2007
- [c1]Adetokunbo Makanju, Patrick LaRoche, Nur Zincir-Heywood:
A Comparison Between Signature and GP-Based IDSs for Link Layer Attacks on WiFi Networks. CISDA 2007: 213-219
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 21:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint