Staff Profile

Oluwasegun Adelaiye
Dr. Oluwasegun Adelaiye

Position: Deputy Dean, School of Postgraduate Studies

Department: Cyber security

Email: oluwasegun.adelaiye@binghamuni.edu.ng

Biography

Oluwasegun Ishaya Adelaiye, Ph.D. is the current Deputy Dean of the School of Postgraduate Studies, Senior Lecturer and the Pioneer Head of the Department of Cybersecurity at Bingham University, Karu, Nigeria. He holds a Ph.D. in Computer Science from the University of Abuja, Nigeria, an M.Sc. in Information and Network Security with distinction from Robert Gordon University, Aberdeen, UK, and a B.Sc. in Computer Science from the University of Abuja.

Dr. Adelaiye has been a lecturer for over 10 years, advancing through the ranks from Assistant Lecturer to Senior Lecturer, and he has taught more than 20 courses at both undergraduate and postgraduate levels. He has supervised over 50 students, including both undergraduates and postgraduates, and has published 25 research articles. 

In addition to his teaching and research, Dr. Adelaiye has held significant administrative positions, including University Timetable Officer, Departmental Examination Officer, Faculty Examination Officer, Head of Department and member of the University Senate. He has contributed to various committees, including the establishment of the BSc Cybersecurity Programme, Master of Cybersecurity and Digital Forensics programme and collaborations with organizations like Huawei, Data-FI, EC-Council among others.

Dr. Adelaiye’s research focuses on cybersecurity, particularly on detecting and mitigating APTs using advanced techniques such as machine learning, anomaly detection, and malware detection. He is committed to advancing the field of cybersecurity through his mentorship, research, and continuous professional development.

He has authored the book "Protecting Your Digital World: A Layman’s Guide to Cybersecurity" and has received several accolades, including the Vice Chancellor's Commendation Award from Bingham University in 2024 and a Class Prize for Best MSc Graduate in Information and Network Security from Robert Gordon University in 2015.Dr. Adelaiye holds several professional certifications including an ISO 27001 Implementer. Dr. Adelaiye is also a reviewer for several academic journals, and an associate editor for two high impact journals. Dr. Adelaiye is a member of the British Computer Society and participates in national and international standardization and technical committees in data and information security.

Qualifications
SN Name Institution Year Obtained
1 MSc Information and Network Security Robert Gordon University, UK 2015
2 ITIL Foundation Certificate in IT Service Management AXELOS and PeopleCert 2015
3 Cisco Certified Network Associate Cisco Academy 2015
4 Huawei Certified ICT Associate Huawei Technologies Co. Ltd 2020
5 Huawei Certified Academy Instructor Huawei Technologies Co. Ltd 2021
6 Ph.D. Computer Science University of Abuja 2023
7 ISO/IEC 27001:2022 Lead Implementer International Cybersecurity and Digital Forensics Academy 2026
Publications
SN Name Type Status
1 A Comparative Evaluation Of The Effectiveness Of Touchscreen And Keypad Input Styles On Mobile Phones Journal Article
2 Effect Of Technology Distraction On Learning Among Students In Higher Institutions In Central Nigeria Journal Article
3 Evaluating Advanced Persistent Threats Mitigation Effects Journal Article
4 Identifying Vulnerabilities In Apt Attacks: A Simulated Approach Conference Paper
5 Traffic Data Analysis In Detecting And Preventing Lateral Movement Within An Internal Network In Combating Advanced Persistent Threats Conference Paper
6 Privacy Concerns In Biometrics Journal Article
7 Media Access Control (Mac) Protocols: An Overview Journal Article
8 Mitigating Advanced Persistent Threats: A Comparative Evaluation Review Journal Article
9 Mitigating Advanced Persistent Threats Using A Combined Static-Rule And Machine Learning-Based Technique Conference Paper
10 Detecting Lateral Movement In A Network For Combating Advanced Persistent Threats Journal Article
11 Randomized Cyber Attack Simulation Model: A Cybersecurity Mitigation Proposal For Post Covid-19 Digital Era Journal Article
12 Randomized Multi-Biometric Liveness Detection: Prospects And Applications For Secure Authentication Journal Article
13 Improved Detection Of Advanced Persistent Threats Using An Anomaly Detection Ensemble Approach Journal Article
14 Honey Algorithm For Securing And Identifying Hackers In A Pervasive Environment Journal Article
15 Cybersecurity And Cybercrimes In Nigeria: An Overview Of Challenges And Prospects Conference Paper
16 Performance Analysis Of Of Secured Efficient Distributed Storage In Cloud (Secdcloud) Encryption Algorithm Based On Avalanche Effect Conference Paper
17 Protecting Your Digital World: A Layman’s Guide To Cybersecurity Book
18 Cybercrime And Enforcement Of Cyber Law In Nigeria: An Overview Of Challenges And Way Forward Conference Paper
19 Comparative Analysis Of Machine Learning Algorithm For Spam Email Detection Conference Paper
20 Decentralized Autonomous Organization Fund Crowdsourcing Using Blockchain Technology Conference Paper
21 White-Box Machine Learning Approach To Plasmodium Falciparum Malaria Detection Using Multi-Channel Colour Scheme Conference Paper
22 Enhanced Detection Of Apt Vector Lateral Movement In Organizational Networks Using Lightweight Machine Learning Journal Article
23 A Lightweight 256 Hexadecimal Character Substitution Cipher Algorithm Journal Article
24 Multi-Agent Based Spam Detection Using Langchain Llm And Google Gemini Journal Article
25 Comparative Analysis Of Vgg19, Xceptionnet, And Inceptionv3 Models For Detecting Pneumonia In Chest X-Ray Images On Android Devices Journal Article
26 Detecting Email Phishing Using Machine Learning Algorithms. Journal Article
27 Performance Analysis Of Machine Learning Algorithm In Spam Email Classification Journal Article
Research Interests
  • Malware detection
  • Advanced Persistent Threats
  • Machine Learning
  • Penetration Testing
  • Threat Analysis
  • Intrusion Detection System/Intrusion Prevention Systems
  • Network Attack Simulation and Analysis
  • Pattern Recognition