Ethics and Artificial Intelligence for Research
(2025)
Presentation / Conference Contribution
Outputs (9)
Artificial Intelligence and Intellectual Property (2025)
Presentation / Conference Contribution
Artificial Intelligence and Business Transformation (2025)
Presentation / Conference Contribution
Approaches to Automatic Classification, Detection and Segmentation of Breast Arterial Calcification Using Deep Learning (2025)
Journal Article
Objective: Cardiovascular disease (CVD) is the leading cause of premature death in the United Kingdom with one type, coronary artery disease, killing more than two times as many women as breast cancer. Recently, researchers have noted that breast art... Read More about Approaches to Automatic Classification, Detection and Segmentation of Breast Arterial Calcification Using Deep Learning.
Artificial Intelligence in the Workplace (2025)
Presentation / Conference Contribution
Artificial Intelligence in the Workplace
A Comparative Study on the Characteristics and Behaviours of Social Media Users in Response to Fake News on X(Twitter) (2024)
Presentation / Conference Contribution
Social media has proven to be a game- changer in providing avenues for individuals from diverse back- grounds to communicate, exchange ideas, and enable friendships and businesses to reach new heights. Despite these profound advantages, it also has i... Read More about A Comparative Study on the Characteristics and Behaviours of Social Media Users in Response to Fake News on X(Twitter).
Cyber Threat Intelligence Sharing in Nigeria (2024)
Presentation / Conference Contribution
Cybersecurity challenges are common in Nigeria. Sharing cyber threat intelligence is essential in addressing the extensive challenges posed by cyber threats. It also helps in meeting regulatory compliance. There are a range of impediments that preven... Read More about Cyber Threat Intelligence Sharing in Nigeria.
FACO: Fuzzy Ant Colony Optimization for Attack Detection in Smart Water Security using Few-Shot Learning (2024)
Presentation / Conference Contribution
In the realm of smart water utilities, the increasing sophistication of cyber threats presents a significant challenge to the security and operational integrity of water and wastewater treatment facilities. These facilities, heavily dependent on Indu... Read More about FACO: Fuzzy Ant Colony Optimization for Attack Detection in Smart Water Security using Few-Shot Learning.
Ret-gadgets in RISC-V-based Binaries Resulting in Traps for Hijackers (2023)
Presentation / Conference Contribution
The presence of instructions within executable programs is what makes the binaries executable. However, attackers leverage on the same to achieve some form of Control Flow Hijacking (CFH). Such code re-use attacks have also been found to lead to De... Read More about Ret-gadgets in RISC-V-based Binaries Resulting in Traps for Hijackers.