- The role of big data in smart city
IAT Hashem, V Chang, NB Anuar, K Adewole, I Yaqoob, A Gani, E Ahmed, ...
International Journal of information management 36 (5), 748-758 2016
Citations: 1477
- Malicious accounts: Dark of the social networks
KS Adewole, NB Anuar, A Kamsin, KD Varathan, SA Razak
Journal of Network and Computer Applications 79, 41-67 2017
Citations: 211
- Twitter spam account detection based on clustering and classification methods
KS Adewole, T Han, W Wu, H Song, AK Sangaiah
The Journal of Supercomputing 76, 4802-4837 2020
Citations: 104
- Stock trend prediction using regression analysis–a data mining approach
SO Abdulsalam, KS Adewole, RG Jimoh
ARPN Journal of Systems and Software 2011
Citations: 96
- Microarray cancer feature selection: Review, challenges and research directions
MA Hambali, TO Oladele, KS Adewole
International Journal of Cognitive Computing in Engineering 1, 78-97 2020
Citations: 92
- 5G frequency standardization, technologies, channel models, and network deployment: Advances, challenges, and future directions
YO Imam-Fulani, N Faruk, OA Sowande, A Abdulkarim, E Alozie, ...
Sustainability 15 (6), 5173 2023
Citations: 88
- A comprehensive survey on low-cost ECG acquisition systems: Advances on design specifications, challenges and future direction
N Faruk, A Abdulkarim, I Emmanuel, YY Folawiyo, KS Adewole, ...
biocybernetics and biomedical engineering 41 (2), 474-502 2021
Citations: 77
- Efficient data hiding system using cryptography and steganography
C Abikoye Oluwakemi, S Adewole Kayode, J Oladipupo Ayotunde
International Journal of Applied Information Systems IJAIS411 pp. 6 11 2012
Citations: 70
- SMSAD: a framework for spam message and spam account detection
KS Adewole, NB Anuar, A Kamsin, AK Sangaiah
Multimedia Tools and Applications 78, 3925-3960 2019
Citations: 59
- A systematic review and Meta-data analysis on the applications of Deep Learning in Electrocardiogram
N Musa, AY Gital, N Aljojo, H Chiroma, KS Adewole, HA Mojeed, N Faruk, ...
Journal of ambient intelligence and humanized computing 14 (7), 9677-9750 2023
Citations: 55
- A review on rain signal attenuation modeling, analysis and validation techniques: Advances, challenges and future direction
E Alozie, A Abdulkarim, I Abdullahi, AD Usman, N Faruk, IFY Olayinka, ...
Sustainability 14 (18), 11744 2022
Citations: 53
- STUDENTS’ACADEMIC PERFORMANCE AND DROPOUT PREDICTION
AO Ameen, MA Alarape, KS Adewole
Malaysian Journal of Computing 4 (2), 278-303 2019
Citations: 50
- Fingerprint biometric authentication for enhancing staff attendance system
O Oloyede Muhtahir, O Adedoyin Adeyinka, S Adewole Kayode
system 5 (3) 2013
Citations: 48
- Ensemble-based logistic model trees for website phishing detection
VE Adeyemo, AO Balogun, HA Mojeed, NO Akande, KS Adewole
Advances in Cyber Security: Second International Conference, ACeS 2020 2021
Citations: 46
- Development of fingerprint biometric attendance system for non-academic staff in a tertiary institution
KS Adewole, SO Abdulsalam, RS Babatunde, TM Shittu, MO Oloyede
Development 5 (2), 62-70 2014
Citations: 46
- Large scale survey for radio propagation in developing machine learning model for path losses in communication systems
H Chiroma, P Nickolas, N Faruk, E Alozie, IFY Olayinka, KS Adewole, ...
Scientific African 19, e01550 2023
Citations: 37
- Improving the phishing website detection using empirical analysis of Function Tree and its variants
AO Balogun, KS Adewole, MO Raheem, ON Akande, FE Usman-Hamza, ...
Heliyon 7 (7) 2021
Citations: 37
- Multi-objective scheduling of MapReduce jobs in big data processing
IAT Hashem, NB Anuar, M Marjani, A Gani, AK Sangaiah, AK Sakariyah
Multimedia Tools and Applications 77, 9979-9994 2018
Citations: 36
- Hybrid rule-based model for phishing URLs detection
KS Adewole, AG Akintola, SA Salihu, N Faruk, RG Jimoh
Emerging Technologies in Computing: Second International Conference, iCETiC 2019
Citations: 31
- Data Mining in Market Basket Transaction: An Association Rule Mining Approach
SO Abdulsalam, KS Adewole, AG Akintola, MA Hambali
International Journal of Applied Information Systems (IJAIS) 7 (10), 15-20 2014
Citations: 28