Prof. Boniface Kayode Alese

ACADEMIC DEGREES EARNED

  1. Ph.D. Computer Science  (Akure, Nigeria)   2004                                            

  2. M.Tech Computer Science (Akure, Nigeria)    2000                                                          

  3. B.Tech (Ind. Mathematics) (Akure, Nigeria)  1997                                                               

INSTITUTIONS ATTENDED

  1. The Federal University of Technology, Akure      Nov., 2000 – Oct., 2004

  2. The Federal University of Technology, Akure      May, 1998 – Sept., 2000

  3. The Federal University of Technology, Akure      Dec., 1991 – May, 1997

PROFESSIONAL BODY MEMBERSHIP

  1. Member, Nigeria Computer Society, MNCS (Membership Number 05310)

  2. Member, Institute of Electrical and Electronics Engineering (Computer Society) New York, MIEEE (Membership Number 80661453)

  3. Member, Association for Computing Machinery; New York, MACM (Membership Number 0273409) 

  4. Member, International Association of Engineers (Membership Number135763)

  5. Member, Infonomics Society, United Kingdom

  6. Computer Professional of Nigeria (CPN) Registered (Reg No 003686/2012)

  7. Member, Cyber Security Experts Association of Nigeria

  8. Member, Information Systems Security Association, Virginia, United State (Membership Number 38991819)

  9. Member, Information Systems Audit and Control Association, United States of America (Membership Number, 964629)

AWARDS

  1. Dean’s list FUTA  (1992-1996                                                     

  2. National Mathematical Centre Scholarship                (1993-1996)

  3. Federal Government of Nigeria Scholarship Award for PhD Study

  4. Ten different commendation letters from the University

  5. Vice Chancellors Excellence Award on Productivity (2010)

  6. Vice Chancellors Special Recognition Award              (2011)

  7. Vice Chancellors Special Recognition Award for Mentorship and Training (2012)

  8. Federal University of Technology, Akure Alumni Hall of Fame (2012)

  9. Various Students and Organizational Awards

  10. Team mentor, Team Nerds FUTA, Winner of 2011 Microsoft Imagine Cup Competitions

  11. Team mentor, Team Eagle, winner of 2012 and 2013 Ministry of Education Competition and winner 2013 Institution of Software Practitioners of                 Nigeria  (ISPON) and Software Competition

ACADEMIC RANKS HELD

  1. Professor (2014 - Date)

  2. Associate Professor (2011 - 2014)

  3. Senior Lecturer (2009 - 2011)

  4. Lecturer I (2006 - 2009)

  5. Lecturer II  (2003 – 2006)

  6. Assistant Lecturer (2000 - 2003)

  7. Graduate / Research Assistant (1998 - 2000)

SUBJECTS TAUGHT
Undergraduate Level:

  1. Introduction to Computer System

  2. Introduction to Computer and Networks Security

  3. Ethics of Information Technology

  4. Introduction to Fortran Programming 

  5. Comparative Programming Languages 

  6. Signals and Systems 

  7. Computer System Architecture I 

  8. Discrete Structures 

  9. Computer and Networks Security 

  10. Fault Tolerant Computing  

  11. Computer System Architecture II  

  12. Introduction to Cluster Computing  

Postgraduate Level

  1.  Data Communications and Computer Networks

  2.  Quantum Computing

  3.  Research Methodology in Computer Science

  4.  Data Communications and Computer Networks

  5.  Cluster Computing

  6.  Fault Tolerant Computing

  7.  Digital Signal Processing

  8.  Computer and Networks Security

SUPERVISION OF STUDENTS PROJECT WORK/THESIS/RESEARCH
Completed

  1. 35  Postgraduate Diploma Projects (PGD CSC)

  2. 10 Master in Business Administration Project (MBA)

  3. 65 M.Tech in Computer Science.

  4. 24 PhD in Computer Science

  5. 70 Undergraduate Project Works, (B.Tech)

In Progress

  1. 10   Masters’ Degree Programme in Computer Science. (M.Tech)

  2. 6   Ph.D  Computer Science Theses  (Ph.D)

OTHER PROFESSIONALLY RELATED EXPERIENCE

  1. Course Instructor: Workshop on Trends in Cryptography organized by National Mathematical  Centre, Nigeria 2006.

  2. Course Organizer: Workshop on Galileo Board Sponsored by Intel Corporation, 2014

RESEARCH CONDUCTED

  1. Design and implementation of Quantum Cryptography

  2. Biometric Authentication Scheme Using Facial Approach

  3. Biometric Authentication using Gait Approach

  4. Design of a Technical Framework for Combating Cybercrime in Nigeria

  5. Design of Hyper-elliptic Curve Cryptography

  6. Development of a Visual Cryptography Scheme

  7. Development of Multimodal biometric System

  8. Development of e-Commerce System

JOURNAL PUBLICATIONS

  1. Alese B.K. and Falaki S.O. (2002), Solving the Vulnerability problem of in Data Encryption Standard (DES), Journal of Science and Technology Research, 2:(2):9-12. (Nigeria)

  2. Alese B.K. and Falaki S.O. (2003), Designing a Digital Certificate for Electronic Payment System in Nigeria, Citadel Journal Services for Professionals, Centre for Environment and Rural Development Network, 1(b):58-64 (Nigeria)

  3. Alese B.K. and Falaki S.O. (2003), The Future of Internet telephony, Citadel Journal Services for Professionals, Centre for Environment and Rural Development, 1:52-55 (Nigeria)

  4. Ojomo, A.O., Oladipo I.O. and Alese B.K. (2003),  Survey of User’s Preferencefor Computer Microprocessors, Citadel Journal Services for Professionals, Centre for Environment and Rural Development 1:56-60 (Nigeria)

  5. Alese B.K. and Falaki S.O. (2004), Securing Computer and Computer Networks against Intruders, “Expertus”, Journal of Sustainable Development, 2(1): 12-24.  (Nigeria)

  6. Falaki S.O. and Alese B.K. (2004), On Data Encryption Standard (DES) and its Vulnerability, The Nigeria Journal of Education, A scientific, Technological and Educational Journal, 1:(2):32-48. (Nigeria)

  7. Alese, B.K. and Owoyemi, S.O. (2004), Factor Analytic approach to Internet Usage in South-Western Nigeria, Journal of Information Technology Impact, 4:(3):171-18. (USA)

  8. Olotua, O. A. and Alese, B.K. (2004); “Computer Technology & Architecture The Interface”, In Nigeria Journal of Computer Literacy. 5:(1):70-83. (Nigeria)

  9. Falaki S.O., Alese B.K., and Longe O.B. (2005), The Importance of Error Correcting Codes in Sending Messages Across a Noisy Channel. An International Journal of Biological and Physical Sciences, LAUTECH. Vol. 10. No. 1 pp 105-109. (Nigeria)

  10. Alese, B.K., Owoyemi, S.O. and Ajayi, M.O. (2005); Gender Influence on Internet Usage in South-Western Nigeria, Journal of Information technology Impact, 5(2):81-98 (USA)

  11. Alese B.K. and Falaki S.O. (2005), Malicious codes and Computer Network Security, Journal of Research in Physical Sciences; 1:(1): 32-35 (Nigeria)

  12. Alese B.K., Ogundele O.S. and Thompson A.F (2005); “E-Voting in Nigeria: Security and Reliability Issues”, Nigerian Journal of Computer Literacy (NJCL), 6:1: 158 – 176, Nigeria. ISSN: 1118-0056. (Nigeria)

  13. Olorunfemi, T.O.S., Aderibigbe, F.M., Alese, B.K. and Fasakin, E. A. (2006), Utilization of Duckweed (Lemma Paucicostata) in Least-cost Feed Formulation for Broiler Starter: A linear Programming Analysis; Information technology Journal 5(1):166-171, Asian Network for Scientific Information. (Pakistan)

  14. Alese B.K. (2006); Elliptic curve based digital signature scheme, Standardizer of Nigeria Academics, (2):96-107 (Nigeria)

  15. Olorunfemi, T.O.S., Alese, B.K., Falaki, S.O. and Fajuyigbe O. (2006); Analysis of elliptic curve cryptosystem with conventional cryptosystem, Science Research Annals, 2:(1):19-27. (Nigeria)      

  16. Alese, B.K. (2006), Effects of Common Attacks on elliptic curve encryption system. The Nigerian Journal of Education, A scientific, Technological and Educational Journals, 4:(2):27-35. (Nigeria)

  17. Olorunfemi, T.O.S., Alese, B.K. and Falaki S.O. (2006), Implementation of Elliptic curve Nyberg-reuppel Digital Signature, International Journal of Numerical Mathematics. 2:323-349. (Nigeria)    

  18. Alese, B.K., Falaki S.O. and Adewale, O.S. (2006);  Elliptic Curve  key Agreement Scheme, Standardizer of Nigeria Academic, 3:(1):34-42 (Nigeria)

  19. Alese, B.K. (2006), Security of Elliptic Curve Crytosystem, Science focus, An International Journal of Biological and Physical sciences. 2(2):154-160 (Nigeria)

  20. Alese B.K., Ogunbanjo S.A., Falaki, S.O. and Adewale O.S., (2006); Service model estimation for technical efficiency of Internet service Providers in Western Nigeria Journal of Information technology Impact, 6:(3):135-152. (USA)

  21. Alese, B.K. (2006); Alert Correlation in Intrusion Detection System, International Journal of Physical Sciences; 1:(1):59-62.(Nigeria)

  22. Adeola, O.S., Alese, B.K. and Falaki, S.O. (2006); National Crime Intelligence System, Information Technology Journal 6(5):633-647. Asian Network for Scientific Information. 5:(1): 166-171 (Pakistan)

  23. Olorunfemi, Temitope O.S., Alese, B. K., Falaki S.O. and Fajuyigbe O. (2007);  Implementation of Elliptic Curve Digital Signature Algorithm; Journal of Software Engineering; Academic Journals Inc., ISSN 1819-4311, 1: (1): 1-12. (USA)

  24. Thompson, A.F., Alese, B.K. and Falaki, S.O. (2007); Finding the silence zone in speech Cipher. International Journal of Numerical Mathematics. 2:(1):64-86. (Nigeria)

  25. Ogundele, O.S. and Alese, B.K. (2007), A theoretical Design of Quantum Computer Emulator, Journal of Science And Industrial Studies 5: (4): 105-112.  (Nigeria)

  26. B.K. Alese, O.J. Olojo, O.S. Adewale, A.A. Adetunmbi, and S.O. Falaki. (2007),Factor Analytic Approach to Computer Network/Information Security Awareness in South-Western Nigeria” Pacific Journal of Science and Technology. 8(2):351-366. (USA)

  27. Adetunmbi, A.O, Alese B.K, Ogundele O.S and Falaki, S.O. (2007),  A Data Mining Approach to Network Intrsion Detection, Journal of Computer Science & Its Application, December 2007, 1(2): 24-37 (Nigeria)

  28. Ogundele O.S., Alese B.K and Daramola A.O. (2008), Security Challenges of Portable Storage Devices, Journal of Intellectualism. Vol. 1. No. 2, pp 33-45. (Nigeria)

  29. Akinwonmi, A.E., O.S. Adewale, B. K. Alese, and O.S. Adetunmbi. (2008), “Design of a Neural network   Based Optical Character Recognition System for Musical Notes.” Pacific Journal of Science and technology. 9(1):45-58. (USA)

  30. Adetunmbi A. O., Falaki S. O., Adewale O. S. and Alese B. K. (2008); Network Intrusion Detection based on Rough Set and K-Nearest Neighbour. International Journal of Computing and ICT Research, Vol. 2. No. 1, pp 60 – 66. http.www.ijcir.org/volume 1-number2/article 7.pdf. (Uganda)

  31. Olajide, M.S., Adewale O.S., Alese, B.K. and Adetunmbi A.O. (2008) Comparative Analysis of Rivest Shamir Adleman (RSA), Rabin and El_Gamal Public Key Cryptosystems, Nigerian Journal of Mathematical Physics, Vol 13. pp. 289 -296. (Nigeria)

  32. Alese, B.K., Kupoluyi, A.S., Adetunmbi, A.O., Ogundele, O.S. and Adeola, O.S.  (2008) Distributed Medical Information System in Nigeria- An Efficient Tool for the  Generation and Maintenance of Reliable National Health Information. Nigeria Journal of    Computer Literacy (NJCL). 6: 1: 109 -118. (Nigeria)

  33. Thompson A.F., Alese B.K. and Falaki S.O., (2009), Teleportation in Quantum    Computing, Journal of Physical and Biological Sciences, (Nigeria)

  34. Oladimeji, I. W. and Alese, B. K. (2009); Programmable Hidden Markov Models, Journal of Physical Science and Safety Studies; 1:1:56-63. (Nigeria)

  35. Kuboye, B. M. and Alese, B. K. (2009), Congestion Analysis on the Nigerian Global System for Mobile Communications (GSM); The Pacific Journal of Science, 10:1:262-271(USA)

  36. Kuboye, B. M. and Alese, B. K., (2009); GSM Radio Network Capacity Performance Strategies Journal of Research in Physical Sciences, 5:1:39-44. (Nigeria)

  37. Ogundele, O. S, Adewale O.S. and Alese, B. K., (2009); Review and Analysis of Wireless Network and Mobile Routing Protocols, Journal of Research in Physical Sciences, 14:1:77-86. (Nigeria)

  38. Kuboye, B. M. and Alese, B. K. (2009), The Pathway of GSM to 3G Systems in Nigeria, The Pacific Journal of Science and Technology; 10:2:388-397. (USA).

  39. Alese, B. K., Ogundele, O. S., Thompson, A. F. and Obembe, O. M (2009),; Design of an Enquiry System for Nigeria National Youth Service Corps (NYSC) Scheme Deployment Using WAP, 4:2:11-15. (India)

  40. Ogundele O.S., Alese, B.K. and O.O.Matthew (2009); A Bio-Inspired Concept for Information Security Modelling. International Journal of Green Computing, 1: 1:53 – 57 (UK)

  41. Akinyede R.O., Alese, B.K. and Adewale O.S. (2009); Poverty Reduction in Nigeria Using Information Technology Proceedings, International Journal of Green Computing, 1: 1:16 – 27 (UK)

  42. Ogunleye G.O., Adewale O.S, Adetunmbi A.O., Alese B.K. and Ogunde A.O. (2010); Deadlock Detection in Agent-based Virtual Knowledge Communities, Annals Computer Science Series, 8:2:27- 44 (Romania)

  43. Falaki S.O., Alese B.K  and Ismaila (2010); An Update on Credit Card On-Line Transactions, International Journal of Economic Development Research and Investment, Vol. 1 Nos. 2 & 3 2010. (Nigeria)

  44. Ogunleye G.O., Adewale O.S, Ogunde A.O. and Alese B.K. (2011); A Security framework for Virtual Knowledge Communities, Annals Computer Science Series, 9:1:85- 98 (Romania)

  45. Ogundele O.S., Alese B.K., Falaki S.O, Alowolodu O.D. and Adewale O.S (2011); A formal Approach to Modelling Delegation Policy Based On Subject attributes and Role Hierarchy  Journal  and ICT Research, 5:1:65- 78 (Uganda)

  46. Ismaila W.O., Omidiora E.O., Alese B.K. and Adetunji A.O. (2011); Knowledge Discorvery in Large Items Dataset. International Journal of Development Studies, 6:2:1-6 (Nigeria)

  47. Iwasokun G. B., Akinyokun B. K., Alese B. K. and Olabode O. (2011); ‘’A Modified Approach to Crossing Number and Post-Processing Algorithms for Fingerprint Minutiae Extraction and Validation’.  IMS Manthan International Journal of Computer Science and Technology, India, Volume 6 Issue 1, ppl-9 (India).

  48. Iwasokun G. B., Akinyokun O. C., Alese B. K. and Olabode O. (2011): ‘Adaptive and Faster Approach to Fingerprint Minutiae Extraction and Validation’.  International Journal of Computer Science and Security, Malaysia, Volume 5 Issue 4, page 414-424 (Malaysia).

  49. Akintola K. G., Alese B. K. and Thompson A. B. (2011): ‘Time Series Forecaster with Neural Network: A case study of Stock of Intercontinental Bank, Nigeria. International Journal of Research and Reviews in Applied Sciences’ ISSN 2076-7344 9(3), (Pakistan).

  50. Ogundele O. S., Adewale O. S., Alese B. K. and Falaki S. O. (2011), ‘A Formal Structure of Separation of Duty and Trust in Modelling Delegation Policy’, Journal of Computer Science and Technology (JCS&T), Vol. 11, No. 2, Pg 100-107. (Argentina)

  51. Thompson A. F., Gabriel A. J. and Alese B. K. (2011): Design of a Hybrid Aircraft Tracking System for Developing Countries’ International Journal of Computer and Organization Trends, Vol. 1 (3): 5-9 (India)

  52. Alese B. K., Gabriel J. A. and Adetunmbi A. O. (2011): ‘Design and Implementation of Internet Protocol Security Filtering Rules in a Network Environment’.  International Journal of Computer Science and Information Security (IJCSIS), USA Vol. 9, No. 7.  Pages 134-143 (USA).

  53. Kuboye B. M., Alese B. K., Fajuyigbe O. and Adewale O. S. ‘Development of Models for Managing Network Congestion on Global Systems for Mobile Systems (GSM) in Nigeria’, International Journal of Wireless Networking and Communications 1(1) 8-15, 2011, (USA).

  54. Oghenerukevwe E. Oyinloye, Ayodeji I. Fasiku, Alese B. K. and Akinbohun F. (2011): ‘Development of Enhanced token using picture password and public key infrastructure mechanism for digital signature pp161-163 International Journal of Computer Science and Information Security (USA).

  55. Alese B. K., Iyare O. M. and Falaki S. O. (2011): ‘Design of a Secure Information sharing system for E-policy in Nigeria pp144-151 International Journal of Computer Science and Information Security (USA).

  56. Iwasokun G. B., Alese B. K. Aranuwa F. O. and Adegoke M. O. (2012): ‘Computer Based Analysis of Parents’ Contribution to the Productivity of Public Secondary Schools in Nigeria.  IMS Manthan International Journal of Computer Science and Technology, India, Volume 6 Issue II (India).

  57. Iwasokun G. B., Alese B. K., Thompson A. B. and Aranuwa O. F. (2012):  ‘Computer Model Analysis of the Performance of ICT in the Nigerian Universities’.  International Journal of Advanced Research in Computer Science and Software Engineering (IJACSA), India, Volume 2, Issue 1, January 2012 IISN:  2277 128X (India).

  58. Iwasokun G. B., Akinyokun O. C., Alese B. K. and Olabode O. (2012):  ‘Fingerprint Image Enhancement: Segmentation to Thinning’, International Journal of Advanced Computer Science and Applications (IJACSA), India, Vol. 3, No. 1, 2012 (India).

  59. Iwasokun G. B., Alese B. K., Thompson A. B.  and Aranuwa O. 0F. (2012): ‘Statistical Evaluation of the Impact of ICT on Nigerian Universities’, International Journal of Educational Development with ICT’, West Indies, Volume 8, Issue 1 (West Indies).

  60. Adewale O. S., Ibam E. O. and Alese B. K. (2012): ‘A Web-Based Virtual Classroom System Model, Turkish Online Journal of Distance Education ISSN 130-64B 13(1)14. (Turkey)

  61. Gabriel O. Ogunleye, Olumide S. Adewale and Alese B. K. (2012): ‘An Adaptive Security Model for Detecting DDOS Attack in Virtual Knowledge Communities’, University of the West of Scotland, Vol. 16, No. 1, ISSN 1352-9404.  (Scotland).

  62. Iwasokun G. B., Alese B. K., Thompson A. F. and Aranuwa O. F. (2012): ‘Computer Model Analysis of the Performance of ICT in the Nigerian Universities’, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2 (1) ISSN: 2277 128X.  (West Indies).

  63. Alese B. K., Osisanwo F. Y., Fasoranbaku O., and Adetunmbi A. O. (2012): ‘Security Threats Prediction on Local Area Network’, International Journal of Engineering and Technology Vol. 2 No. 7, 2012 ISSN 2049-3444.  (UK).

  64. Alese B. K., Mogaji S. A., Adewale O. S. and Daramola O. (2012): ‘Design and Implementation of Gait Recognition System’, International Journal of Engineering and Technology, Vol. 2 No. 7, ISSN 2049-3444.  (UK).

  65. Ismaila W. O., Alese B. K., Adeosun O. O. and Arulogun O. T. (2012): ‘Performance Evaluation of Unsupervised Neural Network in Fraud Detection’, Journal of Physical Sciences and Innovation, Vol. 4.  (Nigeria).

  66. Akinsowon O. A., Adewale O. S. and Alese B. K. (2012):  ‘Design of A Fingerprint Authentication System for Access Control’ Vol. X fasc. 1 – 2012. (Romania)

  67. Alese B. K., Adewale O. S., Aderounmu G. A., Ismaila W. O. and Omidiora E. O. (2012): ‘Investigating the Effects of Threshold in Credit Card Fraud Detection System’, International Journal of Engineering and Technology Volume2 No. 7, ISSN 2049-3444. (UK)

  68. Kuboye B. M., Alese B. K., and Imasuen F. I. (2012):  ‘A Twin Approach to Internet Service Provision in Sparse Rural Community in Nigeria. International Journal of Wireless Networking and Communications 2(5) 132-137, 2012, (USA).

  69. Alese B. K., Philemon E. D. and Falakin S. O. (2012): ‘Comparative Analysis of Public-Key Encryption Schemes: International Journal of Engineering and Technology Volume 2 No. 9, ISSN 2049-3444 (UK).

  70. Ogundele, O. S., Alese, B. K., Ibidunmoye, E. O. and Ajayi, M. O. (2012); Developent and Analysis of a Logical+97 Attack Grapph: Case Study of Federal University of Technology, Akure (FUTA) Network; FUTA Journal of Research in Sciences (Nigeria).

  71. Falaki S. O., Alese, B. K., Adewale O. S., Ayeni J. O., Aderounmu G. A. and Ismaila W. O.(2012); ‘Probabilistic Credit Card Fraud Detection System in Online Transactions’, International Journal of Software Engineering and Its Applications, Volume 6, No. 4.  (UK)

  72. Ajayi A. O., Akinyokun O. C. and Alese, B. K. (2012); ‘A Web Based System for the Appraisal of Human Immuno-Deficiency Virus and Acquired Immune Deficiency Syndrome’, Journal of Emerging Trends in Computing and Information Sciences, ISSN 2079-8407, Volume 3, No. 10.

  73. Odekunle K. A., Akinyokun O. C. and Alese, B. K. (2012); ‘Development of an Expert System for Message Routing in a Switched Network Environment’, Annals. Computer Science Series. 10th Tome 2nd Fasc. (Romania)

  74. Arakete S. A., Akinyokun O. C., Olabode O. and Alese, B. K. (2013): ‘Design of a Mobile Agent for Monitoring Activites of Users’ Computer Engineering and Intelligent Systems, ISSN 2222-1719 (Paper) ISSN 222-2863 (Online), Volume 4, No. 2. (USA).

  75. Adebayo O. T., Alese, B. K., and Gabriel A. J. (March, 2013); ‘A Model for Computer Worm Detection in a Computer Network’, International Journal of Computer Applications (0975-8887), Volume 66 - No. 2. (Germany)

  76. Ade-Ibijola A. O., Adetunmbi A. O. and Alese B. K. (2012); A Simple Computer Game for Learning Mathematics.  Journal of E-Learning and Education (ELEED), Volume 9, December 12, 2012.  Digital Peer Publishing, Germany.  Online Index:  http://eleed.campussource.de/archive/9/3546 (Germany).

  77. Alowolodu O. D., Alese B. K., Adetunmbi A. O., Adewale O. S. and Ogundele O. S. (2013); ‘Elliptic Curve Cryptography for Securing Cloud Computing Applications’, International Journal of Computer Applications (0975 – 8887), Volume 66 – No. 23, (Germany).

  78. Ibidunmoye E.O., Alese, B.K. and Ogundele O.S. (2013); A Game-theoretic Scenario for Modelling the Attacker-Defender Interaction.  Journal of Computer Engineering & Information Technology.

  79. Ibidunmoye E.O., Alese, B.K. and Ogundele O.S. (2013); Modeling Attacker-Defender Interaction as a Zero-Sum Stochastic Game. Journal of Computer Science and Applications, 2013. Vol. 1. No 2, 27-32. Online at http//pubs.sciepub.com/jcsa/1/2/3 © Science and Education Publishing. DOI:10.1269/jcsa-1-2-3

  80. Agboola A.H., Gabriel A.J., Aliyu E.O., and Alese B.K   (2013); Development of a Fuzzy Logic Based Rainfall Prediction Model. International Journal of Engineering and Technology. Volume 3 No. 4 April, 2013.

  81. Odekunle K.A., Alese B.K., and Abiola O.B            (2013); Neuro-Fuzzy System for Routing in a Computer Network, International Journal of Computer Application (0975-8887) Vol. 68- No.9, April, 2013.

  82. Ayeni, O.A.,  Alese, B.K., Dada, O.M. and Aliyu, E. O. (2013) Leveraging on Honeypot Technology to Improve Network Security, International Journal of Engineering Research and Techno logy (IJERT) Vol. 2,  April, 2013.

  83. Ayeni, O.A., Alese, B.K., and Omotosho L. O. (2013) Design and Implementation of a Medium Interaction Honeypot, International Journal of Computer Applications (0975 – 8887) Vol. 70 – No. 22, May, 2013.

  84. Alese, B.K., Dada, O.M. and Ayeni, O.A., (2013) Design and Implementation of a Medium Interaction Honeypot, International Journal of Computer Applications vol. 72, pp 5 -10.

  85. Iwasokun G. A., Alese B. K., Thompson F. B. and Omoniyi V. I. (2013).  Web Enabled Campus Emergency Communication System, Journal of Computer Engineering & Information Technology.

  86. Mbang, U.B., Alese, B. K., Adewale, O.S. and Enikanselu P. A. (2013) Effect of Linear Versus Curved Wavelet Paths in Seismic Oil Exploration Over Kukawa Axis, Borno State, Nigeria, International Journal of Engineering Research and Techno logy (IJERT) Vol. 2,  June, 2013.

  87. Akinwumi D., Alese B. K., and Oluwadare S. A. (2013) Network Worm Containment Using Markov Chain Approach, International Journal of Computer and Information Technology (ISSN:  2279 – 0764) Vol. 02.

  88. Oyekanmi E. O., Oluwadare S. A. and Alese B. K. (2013) Intelligent System for Learning and Understanding of Yoruba Language, International Journal of Computer and Information Technology (ISSN:  2279 – 0764) Vol. 02.

  89. Adu M. K., Alese B. K., Adewale O. S. and Adetunmbi A. O. (2013) ‘Protecting Legitimate Software Users’ Interest in Designing a Piracy Prevention Technique on Computer Network’,  International Institute for Science, Technology & Education Accelerating Global Knowledge Creation and Sharing, Vol. 3, No. 5.

  90. Anyanwu S. I., Alese B. K. and Obe O. O. (2013), ‘Development of a Lattice-based Cryptosystem’, International Journal of Computer Applications (0975 – 8887), Vol. 81 – No. 9.

  91. Adeola O. S, Adewale O. S, and Alese B. K (2013), Integrated E-Learning System (IES) for the Nigeria Universities: An Architectural Overview, American Journal of Database Theory and Application 2013, 2(1): 1-8 DOI: 10.5923/j.database.20130201.01

  92. Iyare O., Alese B. K., Adewale O. and Falaki S. (2013) ‘A Neuro-Fuzzy System for Detection during Interrogation in Law Enforcement Agency’, Anale. Seria Informatică.  Vol. XI. 

  93. Adu M. K., Alese B. K. and Adetunmbi A. O. (2013) ‘Design of Software Piracy Prevention Technique Using Mobile Agent Messaging Call’, Anale. Seria Informatică.  Vol. XI. (Romania).

  94. Thompson, A.F., Adetunmbi A. O. and Alese B. K. (2013): Land Monitoring in Nigeria using Geo-spatial Data Mining Approach. School of Computing and Information Systems Vol. 17, No. 1. (Scotland).

  95. Adetunmbi A. O., Olubadeji Bukky, Alese B. K. and Adeola O. S. (2013) ‘A Discriminatory Model of Self and Nonself Network Traffic’, International Journal of Networks and Communications.

  96. Agbonifo, O. Catherine1*, Adewale, O. Sunday1 and Alese, B. Kayode (2013), Design of a Neurofuzzy­based Model for Active and Collaborative Online Learning, International Journal of Education and Research 9(10)1-22

  97. Ogunleye G. O., Adewale O. S. and Alese B. K. (2013):  Detecting DDOS Attack in an Agent-Based Virtual Knowledge Community. Annuls Computer Science Services (Romania)

  98. Boniface Kayode Alese, Iwasokun Gabriel Babatunde, Haruna Danjuma Israel (2013): DSGM-Based Analysis of Computer Networks Security, International Journal for Information Security Research (IJISR), Vol 3, No 4: 374-382

  99. Ajayi O. O., Alese B. K., Fadugba S. E. and Owoeye Kolade (2014):  ‘Sensing the Nation:  Smart Grid’s Risks and Vulnerabilities’, International Journal of Communications, Network and System Sciences.

  100. Boniface K. Alese, Adebowale J. Adelakun, Otasowie Iyare, Oloruntoba S. Ogundele (2014): A Telepathology Model using JPEG Algorithm for Histological Image Compression, Lecture Notes in Engineering and Computer Science, Springer, 2014;2213 (1):pp525-529.

  101. Aladesote O.I, Boniface K. Alese, Folasade Dahunsi (2014): Intrusion Detection Technique using Hypothesis Testing, Lecture Notes in Engineering and Computer Science, Springer, 2014;2213 (1):pp393-397.

  102. Adu Micheal K, Alese Boniface K, Adewale Olumide S (2014): Mitigating Cybercrime and Online Social Networks Threats in Nigeria, Lecture Notes in Engineering and Computer Science, Springer, 2014;2213 (1):pp413-417.

  103. Eso Dieko, Alese Boniface K, Thompson Aderonke F., Iyare Otasowie (2014): On Forensic Investigation Models, Lecture Notes in Engineering and Computer Science, Springer, 2014;2213 (1):pp177-184.

  104. Bode Moyinoluwa A., Alese Boniface K, Thompson Aderonke F., Iyare Otasowie (2014): A Bayesian Network Model for Risk Management in Cyber Situation, Lecture Notes in Engineering and Computer Science, Springer, 2014;2213 (1):pp434-441.

  105. Opayinka C.A., Alese B.K., Thompson A. F., Alowolodu O. D., Osuolale F. A. (2014):A Multicast Packet Authentication using Signature Amortization Scheme, International Journal for Information Security Research (IJISR),  4(1/2/3/4): 519-528, (UK, 20%)

  106. K. Alese Boniface and K. Adu Michael (2014), Curbing Cybercrime by Application of Internet Users' Identification System (IUIS). International Journal of Computer, Electrical, Automation, Control and Information Engineering, World Academy of Science, Engineering and Technology, Vol:8, No:9, pp 1582 -1585

  107. Omoyele Akinsowon, Boniface Alese, Olumide Adewale (2014):Infrared Capture of Palm-Vein Blood Vessel Patterns for Human Authentication, Journal of Internet Technology and Secured Transactions (JITST), Vol 3, No 1, pp 203-209.

  108. K. Adu Michael and K. Alese Boniface (2014); Inadequate Requirements Engineering Process: A Key Factor for Poor Software Development in Developing Nations: A Case Study. International Journal of Computer, Automation, Control and Information Engineering, World Academy of Science, Engineering and Technology, Vo. 8, No. 9 pp 1578-1581

  109.  Fagbolu, O.O, Adewale, O.S, Alese, B.K and Osuolale, A.F (2014): Secured Banking operations with face-based Automated Teller Machine, International Journal of Innovative Science, Engineering & Technology, India, ISSN 2348-7968 Vol. 1 Issue 10, pp. 584 -592.

  110. Gabriel A.J., Alese B.K.. Adetunmbi A.O., Adewale O.S. (2015):Post-Quantum Crystography based Security Framework for Cloud Computing, Journal of InternetTechnology and Secured Transactions (JITST), Vol 4, No 1, pp 351-357.

  111. B. K. Alese, O. Oyebade, O. Iyare, Osuolale A. Festus, A. F. Thompson (2015): A Web based Information Security Risks Assessment Model, Journal of Internet Technology and Secured Transactions (JITST), Vol 4, No 3, 396-404.

  112. Akingbola R.A., Dahunsi F.M., Alese B.K., Adewale O.S, Ogundele T.J (2015): Improving Deception Capability in Honeynet through Data Manipulation, Journal of Internet Technology and Secured Transactions (JITST), Vol 4, No 1,pp 373-379.

  113. Alese, B. K. Olatunji, S. O., Agbonifo, C. O and Thompson, A.F (2015), Fine-Grained Data Access Control In Wireless Sensor Network, Acta Informatica Pragensia, 4(3):276- 287

  114. Fagbolu, O., Ojoawo A., Ajibake K, and Alese, B. K. (2015); Digital Yoruba Corpus, IJISET - International Journal of Innovative Science, Engineering & Technology, 2( 8):919-926

  115. Osisanwo, F. Y., Adetunmbi, A. O. and Alese, B. K. (2015); Forensic Analysis and the Inimitability of Human Footprints, International Journal of Intelligent Computing Research (IJICR), 6(1):527-530

  116. Olubadeji B., Adetunmbi A.O and Alese B.K.. (2015), DCA as Context (Environment) Sensitive System. International Journal of Computer Applications 131(1):39-46, December 2015. Published by Foundation of Computer Science (FCS), NY, USA.

  117. Adedoyin Olayinka Ajayi, Boniface Kayode Alese, Adebayo Olusola Adetunmbi (2015), An Appraisal of Wireless Sensor Networks: Profiles and Characters; Int. J. Communications, Network and System Sciences, (8) 312-328

  118. K. Alese Boniface, K. Adu Michael, K. Owa Victor (2015), Cyber Security in Nigeria: A Collaboration between Communities and Professionals, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:9, No:5, 2015

  119. O. Iyare, A. H. Afolayan, O. T. Oluwadare and B. K. Alese (2016), Development of a Secured Telemedical System Using Biometric Feature, International Journal of Computer, Electrical, Automation, Control and Information Engineering, World Academy of Science, Engineering and Technology, Vol:9, No:5, Vol.10 No 1 pp 211- 213

  120. Oyinloye, O. E, Alese, B. K. Thompson F. and Adetunmbi, A. O. (2017); A Proposed Lower Computational Complexity Secret Key Mirroring System on GSM. Journal of Computer Science and Systems BiologyVol. 10 No 1 pp 6 -11.

  121. Bukola A. Onyekwelu, B. K. Alese, A. O. Adetunmbi, (2017); "Pre-Processing of University Webserver Log Files for Intrusion Detection", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.1, pp.20-30, 2017.DOI: 10.5815/ijcnis.2017.01.03

  122.  Lawrence B. Adewole, Adebayo O. Adetunmbi, Boniface K. Alese and Samuel A. Oluwadare (2017),  Token Validation in Automatic Corpus Gathering for Yoruba Language.  FUOYE Journal of Enginneering and Technology, 2(1) 14 -1   

    PUBLISHED CONFERENCE PROCEEDINGS

  123. Falaki S.O. and Alese B.K. (2002). Securing the G.S.M. against attacks, proceedings of Computer Association of Nigeria, 13: (1):143 – 148. (Nigeria)

  124. Falaki S.O. and Alese B.K. (2002). The Principles and functionality of Bilateral Firewall, Proceedings of Computer Association of Nigeria, 13: (1): 72 – 78. (Nigeria)

  125. Longe O.B., Alese B.K., and Imiere E. (2004). Occupational Health Consideration in Building an Institutional Framework for Indigenous IT Development. Proceedings of Nigeria Computer Society ICADEV ‘04, 15:171 – 175. (Nigeria)

  126. Alese, B.K. and Adetunmbi, A (2005), Privacy, Trust and Security Framework for Pervasive and Large Systems (Case Study: e-health application), International Conference on Science and technology, 729-732  (Nigeria)

  127. Falaki, S.O. and Alese, B.K. (2005): The Roles of Physical Security, Data Access Control and Data Encryption and Data Encryption Security Measures in Computer. Network Security, International Conference on Science and Technology, 713-723 (Nigeria)

  128. Falaki S.O. and Alese B.K. (2006), Developing a feasible IT security and privacy policy for Nigeria, Proceedings of Nigeria Computer Society. 17:79-84 (Nigeria)

  129. Fajuyigbe O. and Alese B.K. (2006); Bridging Information Infrastructure divide between urban and rural/remote communities in Nigeria, Proceedings of Nigeria Computer Society 17:167-171 (Nigeria)

  130. Alese, B.K. and Adetunmbi, A.O. (2006), Nigeria Electronic voting (e-voting) system, Prospects and  challenges, Proceedings of Nigeria Computer Society. 17:197-208 (Nigeria)

  131. Olorunfemi T.O.S., Alese, B.K., Falaki, S.O. and Fajuyigbe O. (2006); Implementation of Elliptic curve digital signature algorithms. Proceedings of International Conference on New Trends in the mathematical and Computer Sciences with Applications to Real World Problems (NTMMCS 2006). 523-543 (Nigeria)

  132. Olorunfemi, T., Alese, B.K. and Akinsele, O. (2007); Mobile Internet Cryptography:        Proceedings of The International Conference and Workshop on 3G GSM & Mobile Computing; ISBN:978-37963-2-1:88-95 (Nigeria)

  133. Ogundele, O. S., Adewale, O. S. and Alese, B.K. (2007); Reliability issues of GSM  Security Protocol Proceedings of The International Conference and Workshop on 3G GSM & Mobile Computing; ISBN: 978-37963-2-1:124-130 (Nigeria)

  134. Thompson, A.F., Alese, B.K. and Adewale, O.S. (2007); Wireless and mobile networks Proceedings of The International Conference and Workshop on 3G GSM & Mobile Computing; ISBN: 978-37963-2-1:131-141 (Nigeria)

  135. Alese, B.K. and Olorunfemi, O.T. (2007); Developing Privacy Policy in Medical Information Age, Proceedings, 21st National Conference, Nigeria Computer Society, 18: 51 – 59 (Nigeria)

  136. Alese, B.K. Ogundele, O.S., and Akintola, K.G. (2007); Censoring Information on World Wide Web (www), Proceedings, 21st national Conference, Nigeria Computer Society, 18: 111 – 117 (Nigeria)

  137. Falaki, S.O., Alese, B.K. and Thompson, A. F. (2007); Developing Trust in Information System, proceedings 21st National Conference, Nigeria Computer Society, 18:253 – 259 (Nigeria)

  138. Adetunmbi, A. O., Falaki, S.O., Adewale, S.O. and Alese, B.K. (2007); A Rough Set          Approach for Detecting known and Novel Network Intrusions, The Second International Conference on Application of Information and Communication  Technologies to teaching, Research and Administration, 190 – 200. (Nigeria)

  139. Ogundele O. S., Alese B. K. and Akintola K. G. (2007): ‘Censoring Information on  the World Wide Web’, Proceedings of the 31st Annual Conference of Nigerian Computer Society (NCS) on Achieving Nigeria Millennium Development Goals (MDGs) using ICT. Vol. 18: Pg 111-118.(Nigeria)

  140. Adeola, S.O., Falaki, S.O. and Alese, B.K. (2008); A Design Criterion Voting System  in Africa: Nigeria as a case study: 22nd national Conference, Nigeria Computer Society, 19:11 – 16 (Nigeria)

  141. Ogundele, O. S., Adewale, O.S. and Alese, B.K. (2008); Emperical Analysis of the   Impact of Information Technology on Secondary School Education in Ondo – State, Nigeria: 22nd National Conference, Nigeria Computer Society, 19:85 – 96. (Nigeria)

  142. Alese, B. K., Thompson, A. F. and Adetunmbi, A. A. (2008);  An Architectural     Framework for Secure Information System deployment for e-Government in Nigeria,   22nd  National Conference, Nigeria Computer Society, 19: 117 – 122 (Nigeria, 30%)

  143. Adeola, S.O., Olabode, O. and Alese, B. K. (2008); E Neighborhood for Crime   Detection and Control, 22nd National Conference, Nigeria Computer Society, 19: 189 – 193. (Nigeria)

  144. Akinyede R.O., O.K. Boyinbode and Alese, B.K. (2009); Poverty Reduction in     Nigeria Using Information Technology Proceedings, 9th International Conference  MaCGlobe ‘09, Nigeria Computer Society, 20: 51 – 59 (Nigeria)

  145. Adeola O.S, Alese B.K, and Adewale O.S. (2009), Integrated E-Learning System (IES) for the Nigerian Universities: An Antidote against total Collapse ofEducational    System. Proceedings, 9th International Conference MaCGlobe ‘09, Nigeria Computer Society, 20: 325 – 332 (Nigeria)

  146. Ogundele O.S., Alese, B.K. and O.O .Matthew (2009); A Bio-Inspired Concept for Information Security Modelling. Proceedings, 9th International Conference MaCGlobe‘09, Nigeria Computer Society, 20: 107 – 116 (Nigeria)

  147. Akinyede R. O., Boyinbode O. K. and Alese B. K. (2009): ‘Enhancement of   Economic Livelihood of the poor in Nigeria.  Taking the advantage of Information  Technology’ in proceedings of the 9th International Conference and Annual General   Meeting of the Nigeria Computer Society (NCS), Vol. 20, 3-10. (Nigeria)

  148. Akinyede R.O., Alese, B.K. and Adewale O.S. (2010); E-Voting System: Challenges and Solutions. Proceedings, 23rd National Conference RESDEMIT 2010, Nigeria  Computer Society, 20: 53 – 60 (Nigeria)

  149. Akinyede R.O., Daramola O.A. Alese, B.K. and Iyare M.O.  (2010): Nigerian Voting System: Present and Future States. Proceedings, 23rd National Conference RESDEMIT 2010, Nigeria Computer Society, 20: 77 – 82 (Nigeria)

  150. Thompson A.F., Alese B.K., Adewale O.S. and Falaki S.O. (2010),”Enhanced        Person’s Authentication: A Multimodal Biometrics Approach”, 1st International    Conference and Workshop on Software Engineering and Intelligent Systems held at Covenant University, Ota, Nigeria, 5-9 July 2010. 1:167-181. (Nigeria)

  151. Akinwonmi A.E., Kubuoye B.M., Thompson A.F. and  Alese B.K. (2010),”A Neural Network Based System for Political Party Candidates Rating and Selection for Elective Offices in Nigeria”, 1st International Conference and Workshop on Software Engineering and Intelligent Systems held at Covenant University, Ota, Nigeria, 5-9 July 2010. 1:201-214. (Nigeria)

  152. Alese, B.K. and Thompson A.F. (2010); U-Computing: A Sustainable Tool for Bridging Gender Gap in Nigerian Political Process. Proceedings, 23rd National  onference RESDEMIT 2010, Nigeria Computer Society, 20: 307 – 316 (Nigeria)

  153. Adewale O.S, Alese B.K. and Akinyede R.O. (2010),”The Roles of ICT in Local   Government Projection Towards Vision20:2020 and Rebranding of Nigeria (Prospects and Technological Development”, 1st International Conference and Workshop on Software Engineering and Intelligent Systems held at Covenant University, Ota, Nigeria, 5-9 July 2010. 1:303-327. (Nigeria)

  154. Akinyede R.O., Adewale O.S., and  Alese B.K. (2010),”Securing Mobile Payment Systems: Using Personal Identification Number (PIN) Method”, 1st International Conference and Workshop on Software Engineering and Intelligent Systems held at Covenant University, Ota, Nigeria, 5-9 July 2010. 1:201-214. (Nigeria)

  155. Adewale O.S. Ogundele O. S. and Alese, B. K. (2011); A Measurement System for            Monitoring Client Bandwidth Usage, International Conference on ICT for Africa, 23rd – 26th March, 2011, Covenant University & Bells University of Technology, Ota,   Nigeria. 176-182 (Nigeria)

  156. Adewale, O. S., Ibam, O. E. and Alese, B. K. (2011); Web-Based Virtual Classroom System Model for Computer Science Education Programme in Nigeria, 2nd  International Conference on Education, Training and Informatics: ICETI 2011, Orlando Florida, USA (USA)

  157. Iwasokun G. B., Akinyokun O. C., Alese B. K. and Olabode O. (2011): ‘A Mathematical Approach to Fingerprint Enhancement’.  Proceedings of the 10th International Conference, Nigeria Computer Society. (Nigeria)

  158. Ayogu, I.I., Adetunmbi A.O., Alese, B.K. and Kammelu, N.C. (2011) IgboMorph: A        Finite State-Based Morphological Analyzer for Igbo, 6th International Conference on ICT Applications, September 11 – 15, Obafemi Awolowo University, Ile-Ife, pp. 1 -12

  159. Iwasokun G. B., Akinyokun O. C., Alese B. K. and Olabode O. (2011): ‘A Multi-level Model for Fingerprint Enhancement’.  Lecture Notes in Engineering and Computer    Science:  Proceedings of the International Multi-Conference of Engineers and  Computer Scientists, IMECS 2012, 14-16 March, 2012, Hong Kong, pp730-735.  Available online at www.iaeng. org/publication/IMECS2012. (Hong Kong)

  160. G.O. Ogunleye, O.S. Adewale, B.K. Alese and A.O. Ogunde (2011). A Computer Based Security Framework for Crime Prevention in Nigeria. Conference Proceedings of the 10th International Conference on Information technology for People Centred Development of the Nigeria Computer Society (NCS), (ITePED) 2011, Nigeria. Pg. 90-98.

  161. Ogunleye G. O., Adewale O. S. and Alese B. K. (2012): ‘An Exploratory Study on            Electronic Retail Payment Systems:  User Acceptability and Payment Problems in Nigeria’ Proceedings of the 24th National Conference of the Nigeria Computer Society (NCS), Volume 23, ISSN 2141-9663. (Nigeria).

  162. Alese B. K., Thompson F. B., Iwasokun G. B. and Omoniyi V. I. (2013):  Web Enabled Campus Emergency Communication System. An International     Multidisciplinary Conference on Research, Developments and Practices in Science, Technology, Education, Arts, Management & the Social Sciences (Isteams) Paper 21 Page 197-210 C.

  163. Ogunleye G. O., Adewale O. S., and Alese B. K. (2013): Factors Influencing the     Adoption of E-Government Services in Nigeria.  A Conference Proceedings on e-  Government and National Security. ISSN 2141-9663 (Nigeria).

  164. Alese B. K., Iwasokun G. B. and Haruna D. I. (2013):  DGM Approach to Network Attacker and Defender Strategies. ‘Information Security’ A Conference Proceedings    on International Conference for Internet World Congress on Internet Security  Technologies Technology and Secured Transactions, ICITST.

  165. Akinsowon O. A., Alese B. K. (2013): Edge Detection Methods in Palm-Print  Identification. ‘Internet Applications, Infonomics, e-Learning and e-Technology’ A  Conference Proceedings on International Conference for Internet World Congress on Internet Security Technologies Technology and Secured Transactions, ICITST.

  166. Gabriel A. J., Alese B. K., Adetunmbi A. O., and Adewale O. S. (2013):  Post-  quantum Crystography: A Combination of Post-Quantum Cryptography and   Steganography. ‘Information Security’ A Conference Proceedings on International   Conference for Internet World Congress on Internet Security Technologies   Technology and Secured Transactions, ICITST.

  167. Akinwonmi A. E., and Alese B. K. (2013):  A Prosodic Text-to-Speech System for Yorùbá Language ‘Infonomics and e-Technology’ A Conference Proceedings on International Conference for Internet World Congress on Internet Security Technologies Technology and Secured Transactions, ICITST.

  168. Alese B. K., Dahunsi F.M., Akingbola R.A, Adewale O.S., Ogundele T.J (2014), Improving Deception in Honeynet: Through Data Manipulation, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, United Kingdom.

  169. Kuboye Bamidele Moses, Alese Boniface Kayode, Adewale Olumide Sunday (2014); Multi-Level Access Priority Channel Allocation Strategies in Global System   for Mobile Communications Networks, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, United Kingdom.

  170. Iyare Otasowie, Thompson Aderonke F., Alese Boniface K. (2014); A Replication       Model for Students' Results Processing, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, United Kingdom.

  171. Osisanwo F.Y., Adetunmbi A.O., Alese B.K (2014); Barefoot Morphology: A Person  Unique Feature for Forensic Identification, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, United Kingdom.

  172. L. A. Nwosu, A. F. Thompson, B.K Alese, Obe O. (2014); An Attribute-Based      Signature Using Rivest Shamir Adleman Scheme, The 9th International Conference  for Internet Technology and Secured Transactions (ICITST-2014), London, United   Kingdom.

  173. Alese B. K., Oyebade O., Osuolale A. Festus, Iyare O., Thompson A. F (2014);  Evaluation of Information Security Risks Using Hybrid Assessment Model, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, United Kingdom.

  174. Opayinka Christianah A., Alese Boniface K., Thompson Aderonke F., Alowolodu Olufunso D., Osuolale Festus A. (2014); A Robust Multicast Authentication Scheme  Based on Asymmetric Key Signature, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, United Kingdom.

  175. Akinyede Rapahel Olufemi, Alese Boniface Kayode, Adewale Olumide Sunday  (2014), Building a Secure Environment for Client-Side Ecommerce Payment System   Using Encryption System, Proceedings of the World Congress on Engineering 2014 Vol I, WCE 2014, July 2 - 4, 2014, London, U.K

  176. Akinyokun Oluwole C., Alese Boniface K., and Iwasokun Gabriel B. (2014),  Fingerprint Matching Using Spatial Characteristics, Proceedings of the World  Congress on Engineering 2014 Vol I, WCE 2014, July 2 - 4, 2014, London, U.K

  177. Boniface K. Alese, Emmanuel O. Ibidunmoye, D.I. Haruna, Aderonke F. Thompson, Iyare Otasowie (2014), Game-based Analysis of the Network Attack-Defense   Interaction, Proceedings of the World Congress on Engineering 2014 Vol I, WCE 2014, July 2 - 4, 2014, London, U.K

  178. Boniface K. Alese, Aderonke F. Thompson, Korede V. Owa, Otasowie Iyare., Olufemi T. Adebayo (2014), Analysing Issues of Cyber Threats in Nigeria,  Proceedings of the World Congress on Engineering 2014 Vol I, WCE 2014, July 2 -   4, 2014, London, U.K

  179. Alese B. Kayode, Gabriel J. Arome, Olukayode Oluwatoyin and Daramola O.A. (2014), Modelling of Risk Management Procedures for Cybercrime Control Systems, Proceedings of the World Congress on Engineering 2014 Vol I, WCE 2014, July 2 -   4, 2014, London, U.K

  180. Adu Michael K, Alese Boniface K, Adetunmbi Adebayo O. (2014), Design of Software User Identity Module (SUIM) for Preventing Software Piracy, Proceedings of the World Congress on Engineering 2014 Vol I, WCE 2014, July 2 - 4, 2014,  London, U.K

  181. Akinyede Rapahel Olufemi, Alese Boniface Kayode, Adewale Olumide Sunday (2014), Building a Secure Environment for Client-Side Ecommerce Payment System   Using Encryption System, Proceedings of the World Congress on Engineering 2014 Vol I, WCE 2014, July 2 - 4, 2014, London, U.K

  182. Eso Dieko,  Alese Boniface K., Thompson Aderonke F. and Iyare Otasowie (2014), On Forensics Investigation Models, Proceedings of the World Congress on Engineering and Computer Science 2014 Vol I WCECS 2014, 22-24 October, 201 San Francisco, US

  183. Aladesote O. I, Boniface K. Alese, Folasade Dahunsi (2014), Intrusion Detection Technique using Hypothesis Testing, Proceedings of the World Congress on  Engineering and Computer Science 2014 Vol I WCECS 2014, 22-24 October, 2014, San Francisco, US

  184. Adu Michael K,  Alese Boniface K and Adewale Olumide S. (2014), Mitigating Cybercrime and Online Social Networks Threats in Nigeria, Proceedings of the   World Congress on Engineering and Computer Science 2014 Vol I WCECS 2014, 22-24 October, 2014, San Francisco, US

  185. Bode Moyinoluwa A., Alese Boniface K., Thompson Aderonke F. and Iyare Otasowie (2014),  A Bayesian Network Model for Risk Management in Cyber Situation, Proceedings of the World Congress on Engineering and Computer Science  2014 Vol I WCECS 2014, 22-24 October, 2014, San Francisco, US

  186. Boniface K. Alese, Adebowale J. Adelakun, Otasowie Iyare, Oloruntoba S.  Ogundele (2014), A Telepathology Model Using JPEG Algorithm for Histological Image Compression, Proceedings of the World Congress on Engineering and  Computer Science 2014 Vol I WCECS 2014, 22-24 October, 2014, San Francisco,  US.

  187. O. Fagbolu, B.K. Alese and O.S. Adewale (2014), Development of a Digital Yoruba Phrasebook on a Mobile Platform, 25th National Conferenrence of Nigeria Computer  Society.

  188. S.O. Asakpa, B. K. Alese, O.S. Adewale and A.O. Adetunmbi (2014), Secure face Authentication using Visual Cryptography, 25th National Conferenrence of Nigeria   Computer Society

  189. Dauda Adenusi, Boniface Kayode Alese, Bamidele Moses Kuboye and Aderonke Favour-Bethy Thompson (2015), Development of Cyber Situation Awareness Model, International Conference on Cyber Situational Awareness, Data Analytics and Assessment  (Cyber SA 2015), London United Kingdom,

  190. Moyinoluwa Abidemi Bode, Boniface Kayode Alese, Samuel Adebayo Oluwadare,     Aderonke Favour-Bethy Thompson (2015), Risk Analysis in Cyber Situation Awareness using Bayesian Approach, International Conference on Cyber Situational Awareness, Data Analytics and Assessment  (Cyber SA 2015), London United Kingdom

  191. Alese, B. K., Omojowo, A. A., Adesuyi, A. T., Thompson, A. F., Adewale O. S., & Osuolale F. O. (2015). An Enhanced Graphical Password Technique Using Fake Pointers. Proceedings of Informing Science & IT Education Conference (InSITE)2015,79-89.

  192. Akinyokun, O. K., Alese, B. K., Oluwadare, S. A., Iyare, O., & Iwasokun, G. B. (2015). Contributory indices to cybercrime activities in Nigeria. Proceedings of Informing Science & IT Education Conference (InSITE) 2015, 5977.

  193. Akinduro, P. A, Alese, B. K, Alowolodu, O. D, Thompson, A. F, & Akinwonmi, A. E. (2015). Development of a secured shared processing system. Proceedings of Informing Science & IT Education Conference (InSITE) 2015, pp. 29-41

  194. Ojo, S. A, Thompson, A. F., Iyare, O., & Alese, B. K. (2015). On information integrity measurement with secure hash algorithm (SHA). Proceedings of Informing  Science & IT Education Conference (InSITE) 2015, 327-338.

  195. Akinwonmi, F. C, Alese, B. K., Dahunsi, F. M., Osuolale, F. A & Odo, A. E. (2015). Design of circuit systembased cryptography. Proceedings of Informing Science & IT Education Conference (InSITE) 2015, 43-58.

  196. Kuboye B. Moses, Alese B. Kayode, and Oyeyiola Oyedoyin, (2016) "Priority Based Voice Calls Simulation on Global System for Mobile Communications Network," Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering and Computer Science 2016, 19-21 October, 2016, San Francisco, USA, pp108-113

  197. Alese Boniface Kayode, Gabriel Junior Arome, Ayodele Tolulope, and Akinsowon   Omoyele Ajoke, (2016) "Cost-Benefit Analysis of Cyber-Security Systems," Lecture   Notes in Engineering and Computer Science: Proceedings of The World Congress on   Engineering and Computer Science 2016, 19-21 October, 2016, San Francisco, USA,   pp136-144
  198. Alowolodu Olufunso Dayo, Alese Boniface Kayode, (2016) and Adetunmbi Olusola   Adebayo,  "Secured Cloud Application Platform Using Elliptic Curve Cryptography,"   Lecture Notes in Engineering and Computer Science: Proceedings of The World   Congress on Engineering and Computer Science 2016, 19-21 October, 2016, San Francisco, USA, pp208-213
  199. Boniface K. Alese, Abimbola Akindele, Folasade M. Dahunsi, Aderounke F. Thompson and Tosin Adesuyi (2017), A Graphic-Based Cryptographic Model For Authentication, International Conference on Cyber Situational Awareness, Data Analytics and Assesment (Cyber SA 2017), London United Kingdom; pp 299-317
  200. Boniface K. Alese, Aderonke F. Thompson and Patricia Y. Oni (2017), A location Privacy System in Mobile Network Using Game Theory, International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017), London United Kingdom; pp 583-591

 

CONFERENCE AND WORKSHOP ATTENDED WITH DATES AND PAPERS PRESENTED

(i)   18th National Computer Association of Nigeria Conference, Abuja (2002).

        Paper presented: Securing the G. S. M. against attacks.

        Paper presented: Principles of Functionality of Bilateral Firewall

(ii)    Workshop on System Administration and Top-Level Domain Administration O.A.U. Ile Ife July (2002)

(iii)   Workshop on data Collection, Analysis and processing for the Local Government areas statistical officer of Ondo-State, Akure.

        Paper presented: Data Collection Methodologies.

(iv)   International Conference on Science and Technology

        Paper presented:

        (a)        Alese, B. K. and Adetunmbi, A.O.; privacy, Trust and security frameworks for pervasive and large systems (case study – e-health applications)

        (b)       Falaki S.O. and Alese B.K., The roles of physical security, Data Access Control and Data Encryption measures in Computer Network Security.

(v)        20th Annual National Conference of Nigeria Computer Society.

 

        PAPERS PRESENTED

(a)        Developing a feasible IT security and privacy policy for Nigeria,

(b)        Bridging Information Infrastructure divide between urban and rural/remote communities in Nigeria

(c)        Nigeria Electronic voting (e-voting) system, prospects and challenges

(vi)       Research Oriented Course in Advances in Cryptography and Encryption Algorithm, National Mathematical Centre Abuja (May, 2007) (Resource Person)

(vii)      21st National Conference of the Nigerian Computa Society, Owerri, Nigeria (July, 2007)

(viii)     Workshop on STEP-B project  Abuja, Nigeria (May, 2008)

(ix)       Workshop on STEP – B project Abuja, Nigeria (June, 2008)

(x)        22nd National Conference of Nigerian Computer Society

(xi)       Workshop on Proposal Development and Methodology for Need-Driven Research: Contemporary Issues on Grantmanship, Solab Suites, Akure (January, 2009)

(xii)      Training Workshop on International Best Practices and Contemporary Experience Sharing in Project Management; Tanzania (May, 2009)

(xiii)     Workshop and Study Tour on Development Projects’ Best Practices, Singapore (May, 2011)

(xiv)     International Best Practices and Contemporary Experiences, Abuja (June, 2011)

(xv)      Federal Ministry of Education, ICT Conference, 2012

(xvi)     Microsoft Imagine Cup Competition and Academic Workshop, New York (July, 2011)

(xvi)     African Students’ Affairs conference, London United Kingdom (September- October, 2012)

(xvii)    Cyber Defence and Computer Network Conference, London, United Kingdom (February, 2013)

(xviii)   Leadership Training and Workshop at Singapore (April, 2013)

(xix)     Workshop on International Best Practices and Contemporary Experience Sharing in Project Management, University of Greenwich, London, United Kingdom (June, 2013)

(xx)      African Students’ Affairs Conference, University of Witwatersrand, Johannesburg, South Africa (August, 2013)

(xxi)     Federal Ministry of Education, ICT Conference, Abuja (November, 2013)

(xxii)    e-Nigeria Conference, Abuja (December, 2013)

(xxiii)   International Conference for Internet Technology and Secured Transactions, London, United Kingdom (December, 2013)

(xxiv)   Real World Cryptography Workshop, New York City College, New York, United States of America (January, 2014)

(xxiv)   World Congress on Engineering, Imperial College, London, United Kingdom (June-July, 2014)

(xxv)    African Students’ Affairs Conference, Johannesburg, South Africa (August, 2014)

(xxvi)   World Congress on Engineering and Computer Science, University of Berkeley, San Francisco, California, United States of America (October – November, 2014)

(xxvii)  Real World Cryptography, London School of Economics, London, United Kingdom (January, 2015)

(xxviii) Informing Science conference, University of South Florida, Tampa, Florida, United States of America (June 2015)

(xxix)   African Students’ Affairs Conference, Johannesburg, South Africa (August, 2015)

(xxx)    IP Expo Workshop, Excel House, London, United Kingdom (October, 2015)

(xxxi)   IEEE Conference on Lifi Technology, University of Strathclyde, Glasgow (October, 2015)

(xxxi)   InFoSec Euro Workshop, London Olympia, (June, 2016)

(xxxii) IP Expo Workshop, Excel House, London, United Kingdom (October, 2016)

(xxxiii)  World Congress on Engineering and Computer Science, University of Carlifonia, Berkeley, San Francisco (October, 2016)

(xxxiv) International Conference on Cyber Situation Awareness, Data Analytics and Assessment, London (June, 2017)

(xxxv) InFoSEC International Workshop, Excel House London (June 2017)

 

EXTRA CURRICULAR ACTIVITIES

(a)        Within the University

Assistant Examination Officer IMC Department, FUTA               (Nov. 1998-Sept.2000)     

Examination Officer IMC Department, FUTA                                (Sept. 2000 – Dec. 2003)     

Member, Business Committee School of Sciences, FUTA            (2001 – 2002)

Co-opted Member, Senate Committee on School of Management Studies        

Coordinator, Post Graduate Diploma in Computer Science           (Oct. 2002 – Dec. 2004)

Assistant Director, PGD programme, FUTA                               (Feb. 2005 – Feb. 2007)         

Admission officer, Department of Computer Science, FUTA,      (Sept. 2005 – Till Date)

Member, University Senate FUTA                                             (Sept. 2006 – till date)

Member University Communication Committee                        (Oct.2006– Sept., 2008)

Member University Honorary Degree Committee                     (Oct. 2006 – Sept., 2008)      

Associate Director, Entrepreneurship Programme, CEGIST, FUTA   (Jan. 2009 – Till Date)

Member, Senate adhoc Committee on Admission Procedure     

Treasurer, ASUU FUTA branch

Member, Business Committee of Senate FUTA

Hall Warden, Postgraduate Hall, FUTA

Member, Students Welfare Board FUTA

Member, Committee on STEP – B project, FUTA

Monitoring and Evaluation Officer, STEP - B project, FUTA

Staff Adviser, National Association of Computer Science Students, FUTA Chapter (2006 -2009)

Ag. Head, Department of Computer Science, FUTA,             (August, 2009 – July,2011)

Member, University Strategic Planning Committee

Chairman, Business Committee, School of Science Board of Studies.

Chairman, Electoral Committee, Students’ Union Election     (2008 – 2011)

Mentor, Team Nerds Inc, FUTA (Winner Microsoft Imagine Cup, 2011)

Member, Board of Computer Resource Centre                      (2011 – Till date)

Ag. Dean, Students’ Affairs                                                     (Nov., 2011 – Dec 6, 2015)

Chairman, Student Welfare Board                                          (2011 – Till date)

Member, Security Committee                                                  (2012 – Till date)

Member, Ceremonial Committee                                             (2011 – Till date)

Member, Panel on Cult Related Activities

Member, Organising Committee, Association of Vice-Chancellors of Nigerian Universities Conference, 2013

Dean, Students Affairs Division,                                              (Dec. 7, 2015 – Till date)

Chairman, Computer Based Examination Committee              2011 till date

 

(b)        Outside the University

            Member, ASUU ICT Committee (National)

            Full Pastor, The Redeemed Christian Church of God

 

NAMES AND ADDRESSES OF REFREES

            Engr (Professor) S.O. Falaki

            Department of Electrical/Electronics & Computer Engineering

            Afe Babalola University, Ado - Ekiti

            swolefalaki@yahoo.com

 

            Professor O. S. Adewale

            Department of Computer Sciences

            Federal University of Technology, Akure

            adewale@futa.edu.ng

 

             Professor J. A. Fadamiro

            Dept. of Architecture.

            Federal University of Technology, Akure

             joechrisdamiro@yahoo.com