No photo of HAMED BALOGUN

HAMED BALOGUN

    Accepting PhD Students

    20162025

    Research activity per year

    Search results

    • 2025

      AI-Driven Phishing: Techniques, Threats, and Defence Strategies

      Shrestha, L., Balogun, H. & Khan, S., 14 May 2025, Advanced Sciences and Technologies for Security Applications. Kersbergen, A. (ed.). Springer, p. 121-143 23 p. (Advanced Sciences and Technologies for Security Applications; vol. Part F414).

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

    • 2023

      Privacy-Preserving Decision-Making Over Blockchain

      Zhang, J., Zhang, B., Nastenko, A., Balogun, H. & Oliynykov, R., 13 Nov 2023, In: IEEE Transactions on Dependable and Secure Computing. 20, 6, p. 4648-4663 16 p.

      Research output: Contribution to journalArticle (journal)peer-review

      Open Access
      File
      2 Citations (Scopus)
      2 Downloads (Pure)
    • 2019

      A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence

      Zhang, B., Oliynykov, R. & Balogun, H., 27 Feb 2019, 26th Annual Network and Distributed System Security Symposium, NDSS 2019. The Internet Society, (26th Annual Network and Distributed System Security Symposium, NDSS 2019).

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

      Open Access
      15 Citations (Scopus)
    • 2018

      On the sustainability of blockchain funding

      Zhang, B. & Balogun, H., 2 Jul 2018, Proceedings - 18th IEEE International Conference on Data Mining Workshops, ICDMW 2018. Tong, H., Li, Z., Zhu, F. & Yu, J. (eds.). IEEE Computer Society, p. 89-96 8 p. 8637512. (IEEE International Conference on Data Mining Workshops, ICDMW; vol. 2018-November).

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

      Open Access
      3 Citations (Scopus)
    • 2017

      IMPROVE-Identifying minimal profile vectors for similarity based access control

      Misra, G., Such, J. M. & Balogun, H., 9 Feb 2017, Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016. Institute of Electrical and Electronics Engineers Inc., p. 868-875 8 p. 7847033. (Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016).

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

      Open Access
      13 Citations (Scopus)
    • 2016

      Non-sharing communities? An empirical study of community detection for access control decisions

      Misra, G., Such, J. M. & Balogun, H., 21 Nov 2016, Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016. Kumar, R., Caverlee, J. & Tong, H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 49-56 8 p. 7752212. (Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016).

      Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

      Open Access
      10 Citations (Scopus)
    Your message has successfully been sent.
    Your message was not sent due to an error.