Staff Profile
Dr. Oluwasegun Adelaiye
Position: Lecturer I
Department: Cyber security
Email: oluwasegun.adelaiye@binghamuni.edu.ng
Biography
Oluwasegun Ishaya Adelaiye holds a PhD in computer science from the University of Abuja, an MSc in Information and network security from Robert Gordon University Aberdeen, United Kingdom. Dr. Oluwasegun Ishaya Adelaiye primary research focus is in cybersecurity, specializing in combatting Advanced Persistent Threats (APTs), delving into the intricate areas of cyber defense strategies through the utilization of multiple defense approaches including machine learning, pattern recognition, malware detection among others.
His prolific contributions to academia include over 15 published articles spanning diverse topics such as machine learning, anomaly detection, and intrusion detection. Through his mentorship, Dr. Adelaiye has guided and supervised more than 50 students at both the undergraduate and postgraduate levels, nurturing the next generation of cybersecurity professionals.
Dr. Adelaiye has pursued continuous professional development and remains committed to advancing the frontiers of cybersecurity research and education, contributing significantly to the global discourse on digital security. Dr. Adelaiye is the current Head of Department of Cybersecurity, Bingham University. Dr. ADELAIYE in his pursuit for excellence has attained several professional certifications including: HCIA Security, HCIA AI, HCIA Datacom, ITIL among others and is a member of the British Computer Society.
SN | Name | Institution | Year Obtained |
---|---|---|---|
1 | MSc Information and Network Security | Robert Gordon University, UK | 2015 |
2 | ITIL Foundation Certificate in IT Service Management | AXELOS and PeopleCert | 2015 |
3 | Cisco Certified Network Associate | Cisco Academy | 2015 |
4 | Huawei Certified ICT Associate | Huawei Technologies Co. Ltd | 2020 |
5 | Huawei Certified Academy Instructor | Huawei Technologies Co. Ltd | 2021 |
6 | Ph.D. Computer Science | University of Abuja | 2023 |
SN | Name | Type | Status |
---|---|---|---|
1 | A Comparative Evaluation Of The Effectiveness Of Touchscreen And Keypad Input Styles On Mobile Phones | Journal Article | |
2 | Effect Of Technology Distraction On Learning Among Students In Higher Institutions In Central Nigeria | Journal Article | |
3 | Evaluating Advanced Persistent Threats Mitigation Effects | Journal Article | |
4 | Identifying Vulnerabilities In Apt Attacks: A Simulated Approach | Conference Paper | |
5 | Traffic Data Analysis In Detecting And Preventing Lateral Movement Within An Internal Network In Combating Advanced Persistent Threats | Conference Paper | |
6 | Privacy Concerns In Biometrics | Journal Article | |
7 | Media Access Control (Mac) Protocols: An Overview | Journal Article | |
8 | Mitigating Advanced Persistent Threats: A Comparative Evaluation Review | Journal Article | |
9 | Mitigating Advanced Persistent Threats Using A Combined Static-Rule And Machine Learning-Based Technique | Conference Paper | |
10 | Detecting Lateral Movement In A Network For Combating Advanced Persistent Threats | Journal Article | |
11 | Randomized Cyber Attack Simulation Model: A Cybersecurity Mitigation Proposal For Post Covid-19 Digital Era | Journal Article | |
12 | Randomized Multi-Biometric Liveness Detection: Prospects And Applications For Secure Authentication | Journal Article | |
13 | Improved Detection Of Advanced Persistent Threats Using An Anomaly Detection Ensemble Approach | Journal Article | |
14 | Honey Algorithm For Securing And Identifying Hackers In A Pervasive Environment | Journal Article | |
15 | Cybersecurity And Cybercrimes In Nigeria: An Overview Of Challenges And Prospects | Conference Paper | |
16 | Performance Analysis Of Of Secured Efficient Distributed Storage In Cloud (Secdcloud) Encryption Algorithm Based On Avalanche Effect | Conference Paper |
Research Interests
- Malware detection
- Advanced Persistent Threats
- Machine Learning
- Penetration Testing
- Threat Analysis
- Intrusion Detection System/Intrusion Prevention Systems
- Network Attack Simulation and Analysis
- Pattern Recognition