Position: Senior Lecturer
Department: Cyber security
Email: oluwasegun.adelaiye@binghamuni.edu.ng
Oluwasegun Ishaya Adelaiye holds a PhD in computer science from the University of Abuja, an MSc in Information and network security from Robert Gordon University Aberdeen, United Kingdom. Dr. Oluwasegun Ishaya Adelaiye primary research focus is in cybersecurity, specializing in combatting Advanced Persistent Threats (APTs), delving into the intricate areas of cyber defense strategies through the utilization of multiple defense approaches including machine learning, pattern recognition, malware detection among others.
His prolific contributions to academia include over 20 published articles spanning diverse topics such as machine learning, anomaly detection, and intrusion detection. Through his mentorship, Dr. Adelaiye has guided and supervised more than 50 students at both the undergraduate and postgraduate levels, nurturing the next generation of cybersecurity professionals.
Dr. Adelaiye has pursued continuous professional development and remains committed to advancing the frontiers of cybersecurity research and education, contributing significantly to the global discourse on digital security. Dr. Adelaiye is the current Head of Department of Cybersecurity, Bingham University. Dr. Adelaiye in his pursuit for excellence has attained several professional certifications including: HCIA Security, HCIA AI, HCIA Datacom, ITIL among others and is a member of the British Computer Society.
SN | Name | Institution | Year Obtained |
---|---|---|---|
1 | MSc Information and Network Security | Robert Gordon University, UK | 2015 |
2 | ITIL Foundation Certificate in IT Service Management | AXELOS and PeopleCert | 2015 |
3 | Cisco Certified Network Associate | Cisco Academy | 2015 |
4 | Huawei Certified ICT Associate | Huawei Technologies Co. Ltd | 2020 |
5 | Huawei Certified Academy Instructor | Huawei Technologies Co. Ltd | 2021 |
6 | Ph.D. Computer Science | University of Abuja | 2023 |
SN | Name | Type | Status |
---|---|---|---|
1 | A Comparative Evaluation Of The Effectiveness Of Touchscreen And Keypad Input Styles On Mobile Phones | Journal Article | |
2 | Effect Of Technology Distraction On Learning Among Students In Higher Institutions In Central Nigeria | Journal Article | |
3 | Evaluating Advanced Persistent Threats Mitigation Effects | Journal Article | |
4 | Identifying Vulnerabilities In Apt Attacks: A Simulated Approach | Conference Paper | |
5 | Traffic Data Analysis In Detecting And Preventing Lateral Movement Within An Internal Network In Combating Advanced Persistent Threats | Conference Paper | |
6 | Privacy Concerns In Biometrics | Journal Article | |
7 | Media Access Control (Mac) Protocols: An Overview | Journal Article | |
8 | Mitigating Advanced Persistent Threats: A Comparative Evaluation Review | Journal Article | |
9 | Mitigating Advanced Persistent Threats Using A Combined Static-Rule And Machine Learning-Based Technique | Conference Paper | |
10 | Detecting Lateral Movement In A Network For Combating Advanced Persistent Threats | Journal Article | |
11 | Randomized Cyber Attack Simulation Model: A Cybersecurity Mitigation Proposal For Post Covid-19 Digital Era | Journal Article | |
12 | Randomized Multi-Biometric Liveness Detection: Prospects And Applications For Secure Authentication | Journal Article | |
13 | Improved Detection Of Advanced Persistent Threats Using An Anomaly Detection Ensemble Approach | Journal Article | |
14 | Honey Algorithm For Securing And Identifying Hackers In A Pervasive Environment | Journal Article | |
15 | Cybersecurity And Cybercrimes In Nigeria: An Overview Of Challenges And Prospects | Conference Paper | |
16 | Performance Analysis Of Of Secured Efficient Distributed Storage In Cloud (Secdcloud) Encryption Algorithm Based On Avalanche Effect | Conference Paper | |
17 | Protecting Your Digital World: A Layman’s Guide To Cybersecurity | Book | |
18 | Cybercrime And Enforcement Of Cyber Law In Nigeria: An Overview Of Challenges And Way Forward | Conference Paper | |
19 | Comparative Analysis Of Machine Learning Algorithm For Spam Email Detection | Conference Paper | |
20 | Decentralized Autonomous Organization Fund Crowdsourcing Using Blockchain Technology | Conference Paper | |
21 | White-Box Machine Learning Approach To Plasmodium Falciparum Malaria Detection Using Multi-Channel Colour Scheme | Conference Paper | |
22 | Enhanced Detection Of Apt Vector Lateral Movement In Organizational Networks Using Lightweight Machine Learning | Journal Article |