Position: Deputy Dean, School of Postgraduate Studies
Department: Cyber security
Email: oluwasegun.adelaiye@binghamuni.edu.ng
Oluwasegun Ishaya Adelaiye, Ph.D. is the current Deputy Dean of the School of Postgraduate Studies, Senior Lecturer and the Pioneer Head of the Department of Cybersecurity at Bingham University, Karu, Nigeria. He holds a Ph.D. in Computer Science from the University of Abuja, Nigeria, an M.Sc. in Information and Network Security with distinction from Robert Gordon University, Aberdeen, UK, and a B.Sc. in Computer Science from the University of Abuja.
Dr. Adelaiye has been a lecturer for over 10 years, advancing through the ranks from Assistant Lecturer to Senior Lecturer, and he has taught more than 20 courses at both undergraduate and postgraduate levels. He has supervised over 50 students, including both undergraduates and postgraduates, and has published 25 research articles.
In addition to his teaching and research, Dr. Adelaiye has held significant administrative positions, including University Timetable Officer, Departmental Examination Officer, Faculty Examination Officer, Head of Department and member of the University Senate. He has contributed to various committees, including the establishment of the BSc Cybersecurity Programme, Master of Cybersecurity and Digital Forensics programme and collaborations with organizations like Huawei, Data-FI, EC-Council among others.
Dr. Adelaiye’s research focuses on cybersecurity, particularly on detecting and mitigating APTs using advanced techniques such as machine learning, anomaly detection, and malware detection. He is committed to advancing the field of cybersecurity through his mentorship, research, and continuous professional development.
He has authored the book "Protecting Your Digital World: A Layman’s Guide to Cybersecurity" and has received several accolades, including the Vice Chancellor's Commendation Award from Bingham University in 2024 and a Class Prize for Best MSc Graduate in Information and Network Security from Robert Gordon University in 2015.Dr. Adelaiye holds several professional certifications including an ISO 27001 Implementer. Dr. Adelaiye is also a reviewer for several academic journals, and an associate editor for two high impact journals. Dr. Adelaiye is a member of the British Computer Society and participates in national and international standardization and technical committees in data and information security.
| SN | Name | Institution | Year Obtained |
|---|---|---|---|
| 1 | MSc Information and Network Security | Robert Gordon University, UK | 2015 |
| 2 | ITIL Foundation Certificate in IT Service Management | AXELOS and PeopleCert | 2015 |
| 3 | Cisco Certified Network Associate | Cisco Academy | 2015 |
| 4 | Huawei Certified ICT Associate | Huawei Technologies Co. Ltd | 2020 |
| 5 | Huawei Certified Academy Instructor | Huawei Technologies Co. Ltd | 2021 |
| 6 | Ph.D. Computer Science | University of Abuja | 2023 |
| 7 | ISO/IEC 27001:2022 Lead Implementer | International Cybersecurity and Digital Forensics Academy | 2026 |
| SN | Name | Type | Status |
|---|---|---|---|
| 1 | A Comparative Evaluation Of The Effectiveness Of Touchscreen And Keypad Input Styles On Mobile Phones | Journal Article | |
| 2 | Effect Of Technology Distraction On Learning Among Students In Higher Institutions In Central Nigeria | Journal Article | |
| 3 | Evaluating Advanced Persistent Threats Mitigation Effects | Journal Article | |
| 4 | Identifying Vulnerabilities In Apt Attacks: A Simulated Approach | Conference Paper | |
| 5 | Traffic Data Analysis In Detecting And Preventing Lateral Movement Within An Internal Network In Combating Advanced Persistent Threats | Conference Paper | |
| 6 | Privacy Concerns In Biometrics | Journal Article | |
| 7 | Media Access Control (Mac) Protocols: An Overview | Journal Article | |
| 8 | Mitigating Advanced Persistent Threats: A Comparative Evaluation Review | Journal Article | |
| 9 | Mitigating Advanced Persistent Threats Using A Combined Static-Rule And Machine Learning-Based Technique | Conference Paper | |
| 10 | Detecting Lateral Movement In A Network For Combating Advanced Persistent Threats | Journal Article | |
| 11 | Randomized Cyber Attack Simulation Model: A Cybersecurity Mitigation Proposal For Post Covid-19 Digital Era | Journal Article | |
| 12 | Randomized Multi-Biometric Liveness Detection: Prospects And Applications For Secure Authentication | Journal Article | |
| 13 | Improved Detection Of Advanced Persistent Threats Using An Anomaly Detection Ensemble Approach | Journal Article | |
| 14 | Honey Algorithm For Securing And Identifying Hackers In A Pervasive Environment | Journal Article | |
| 15 | Cybersecurity And Cybercrimes In Nigeria: An Overview Of Challenges And Prospects | Conference Paper | |
| 16 | Performance Analysis Of Of Secured Efficient Distributed Storage In Cloud (Secdcloud) Encryption Algorithm Based On Avalanche Effect | Conference Paper | |
| 17 | Protecting Your Digital World: A Layman’s Guide To Cybersecurity | Book | |
| 18 | Cybercrime And Enforcement Of Cyber Law In Nigeria: An Overview Of Challenges And Way Forward | Conference Paper | |
| 19 | Comparative Analysis Of Machine Learning Algorithm For Spam Email Detection | Conference Paper | |
| 20 | Decentralized Autonomous Organization Fund Crowdsourcing Using Blockchain Technology | Conference Paper | |
| 21 | White-Box Machine Learning Approach To Plasmodium Falciparum Malaria Detection Using Multi-Channel Colour Scheme | Conference Paper | |
| 22 | Enhanced Detection Of Apt Vector Lateral Movement In Organizational Networks Using Lightweight Machine Learning | Journal Article | |
| 23 | A Lightweight 256 Hexadecimal Character Substitution Cipher Algorithm | Journal Article | |
| 24 | Multi-Agent Based Spam Detection Using Langchain Llm And Google Gemini | Journal Article | |
| 25 | Comparative Analysis Of Vgg19, Xceptionnet, And Inceptionv3 Models For Detecting Pneumonia In Chest X-Ray Images On Android Devices | Journal Article | |
| 26 | Detecting Email Phishing Using Machine Learning Algorithms. | Journal Article | |
| 27 | Performance Analysis Of Machine Learning Algorithm In Spam Email Classification | Journal Article |