default search action
Habeeb Olufowobi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Christopher Kolimago, Michael P. Robson, Habeeb Olufowobi, Ebelechukwu Nwafor:
Simulating Load Sharing for Resource Constrained Devices. IEEE Access 12: 157021-157038 (2024) - [j8]Afia Anjum, Paul Agbaje, Arkajyoti Mitra, Emmanuel Oseghale, Ebelechukwu Nwafor, Habeeb Olufowobi:
Towards named data networking technology: Emerging applications, use cases, and challenges for secure data communication. Future Gener. Comput. Syst. 151: 12-31 (2024) - [j7]Afia Anjum, Paul Agbaje, Sena Hounsinou, Nadra Guizani, Habeeb Olufowobi:
D-NDNoT: Deterministic Named Data Networking for Time-Sensitive IoT Applications. IEEE Internet Things J. 11(14): 24872-24885 (2024) - [j6]Paul Agbaje, Habeeb Olufowobi, Sena Hounsinou, Gedare Bloom:
From Weeping to Wailing: A Transitive Stealthy Bus-Off Attack. IEEE Trans. Intell. Transp. Syst. 25(9): 12066-12080 (2024) - [c20]Omolade Ikumapayi, Paul Agbaje, Yanyan Zhuang, Habeeb Olufowobi, Gedare Bloom:
Deadline-Based Class Assignment for Time-Sensitive Network Frame Preemption. ICIT 2024: 1-8 - [i1]Pedram MohajerAnsari, Alkim Domeke, Jan de Voor, Arkajyoti Mitra, Grace Johnson, Amir Salarpour, Habeeb Olufowobi, Mohammad Hamad, Mert D. Pesé:
Discovering New Shadow Patterns for Black-Box Attacks on Lane Detection of Autonomous Vehicles. CoRR abs/2409.18248 (2024) - 2023
- [j5]Omolade Ikumapayi, Habeeb Olufowobi, Jeremy Daily, Tingting Hu, Ivan Cibrario Bertolotti, Gedare Bloom:
CANASTA: Controller Area Network Authentication Schedulability Timing Analysis. IEEE Trans. Veh. Technol. 72(8): 10024-10036 (2023) - [c19]Paul Agbaje, Afia Anjum, Arkajyoti Mitra, Sena Hounsinou, Ebelechukwu Nwafor, Habeeb Olufowobi:
Privacy-Preserving Intrusion Detection System for Internet of Vehicles using Split Learning. BDCAT 2023: 07:1-07:8 - [c18]Paul Agbaje, Afia Anjum, Zahidur Talukder, Mohammad A. Islam, Ebelechukwu Nwafor, Habeeb Olufowobi:
FedCime: An Efficient Federated Learning Approach For Clients in Mobile Edge Computing. EDGE 2023: 215-220 - [c17]Afia Anjum, Habeeb Olufowobi:
Towards Mitigating Blackhole Attack in NDN-Enabled IoT. ICCE 2023: 1-6 - [c16]Ebelechukwu Nwafor, Carter Schmidt, Habeeb Olufowobi:
IoT-MGSec: Mitigating Man-in-the-Middle Attacks in IoT Networks Using Graph-Based Learning. ICMLA 2023: 1261-1266 - [c15]Paul Agbaje, Ebelechukwu Nwafor, Habeeb Olufowobi:
Deep Reinforcement Learning for Energy-Efficient Task Offloading in Cooperative Vehicular Edge Networks. INDIN 2023: 1-8 - [c14]Omolade Ikumapayi, Habeeb Olufowobi, Jeremy Daily, Tingting Hu, Ivan Cibrario Bertolotti, Gedare Bloom:
Work in Progress: Schedulability Analysis of CAN and CAN FD Authentication. RTAS 2023: 349-352 - [c13]Afia Anjum, Sena Hounsinou, Habeeb Olufowobi:
Work-in-Progress: Deadline-Aware Named Data Networking for Time-Sensitive IoT Applications. RTAS 2023: 353-356 - 2022
- [j4]Uchenna Ezeobi, Habeeb Olufowobi, Clinton Young, Joseph Zambreno, Gedare Bloom:
Reverse Engineering Controller Area Network Messages Using Unsupervised Machine Learning. IEEE Consumer Electron. Mag. 11(1): 50-56 (2022) - [j3]Paul Agbaje, Afia Anjum, Arkajyoti Mitra, Emmanuel Oseghale, Gedare Bloom, Habeeb Olufowobi:
Survey of Interoperability Challenges in the Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 23(12): 22838-22861 (2022) - [c12]Vijay Banerjee, Sena Hounsinou, Habeeb Olufowobi, Monowar Hasan, Gedare Bloom:
Secure Reboots for Real-Time Cyber-Physical Systems. CPSIOTSEC@CCS 2022: 27-33 - [c11]Ebelechukwu Nwafor, Habeeb Olufowobi:
CANBERT: A Language-based Intrusion Detection Model for In-vehicle Networks. ICMLA 2022: 294-299 - [c10]Afia Anjum, Paul Agbaje, Sena Hounsinou, Habeeb Olufowobi:
In-Vehicle Network Anomaly Detection Using Extreme Gradient Boosting Machine. MECO 2022: 1-6 - 2021
- [c9]Sena Hounsinou, Mark Stidd, Uchenna Ezeobi, Habeeb Olufowobi, Mitra Nasri, Gedare Bloom:
Vulnerability of Controller Area Network to Schedule-Based Attacks. RTSS 2021: 495-507 - [c8]Ebelechukwu Nwafor, Michael P. Robson, Habeeb Olufowobi:
Dynamic Load Sharing in Memory Constrained Devices: A Survey. WF-IoT 2021: 586-591 - 2020
- [j2]Habeeb Olufowobi, Clinton Young, Joseph Zambreno, Gedare Bloom:
SAIDuCANT: Specification-Based Automotive Intrusion Detection Using Controller Area Network (CAN) Timing. IEEE Trans. Veh. Technol. 69(2): 1484-1494 (2020)
2010 – 2019
- 2019
- [j1]Clinton Young, Joseph Zambreno, Habeeb Olufowobi, Gedare Bloom:
Survey of Automotive Controller Area Network Intrusion Detection Systems. IEEE Des. Test 36(6): 48-55 (2019) - [c7]Ebelechukwu Nwafor, Habeeb Olufowobi:
Towards an Interactive Visualization Framework for IoT Device Data Flow. IEEE BigData 2019: 4175-4178 - [c6]Habeeb Olufowobi, Sena Hounsinou, Gedare Bloom:
Controller Area Network Intrusion Prevention System Leveraging Fault Recovery. CPS-SPC@CCS 2019: 63-73 - [c5]Clinton Young, Habeeb Olufowobi, Gedare Bloom, Joseph Zambreno:
Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes. AutoSec@CODASPY 2019: 9-14 - [c4]Habeeb Olufowobi, Uchenna Ezeobi, Eric Muhati, Gaylon Robinson, Clinton Young, Joseph Zambreno, Gedare Bloom:
Anomaly Detection Approach Using Adaptive Cumulative Sum Algorithm for Controller Area Network. AutoSec@CODASPY 2019: 25-30 - 2018
- [c3]Habeeb Olufowobi, Gedare Bloom, Clinton Young, Joseph Zambreno:
Work-in-Progress: Real-Time Modeling for Intrusion Detection in Automotive Controller Area Network. RTSS 2018: 161-164 - [c2]Md. Salik Parwez, Habeeb Olufowobi:
Cost-constrained Handoff in Next Generation Heterogeneous Wireless Networks. UEMCON 2018: 911-916 - 2016
- [c1]Habeeb Olufowobi, Robert Engel, Nathalie Baracaldo, Luis Angel D. Bathen, Samir Tata, Heiko Ludwig:
Data Provenance Model for Internet of Things (IoT) Systems. ICSOC Workshops 2016: 85-91
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint