Browsing by Author Subairu, S. O.

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 10 of 10
Issue DateTitleAuthor(s)
2020-09A Comparative Experimental Evaluation of the Detection Rates and Removal Abilities of Fifteen Malware Detector Tools on Xpaj.MBR RootkitSubairu, S. O.; Alhassan, J. K.; Nwaocha, V. O.; Saidu, I. R.
2017Comparative Performance Study of Antimalware Tools on TDL-4 RootkitSubairu, S. O.; Isah, Abdulkadir Onivehu; Alhassan, J. K.
2024-06-30Development of an Improved Winternitz Hash-based Signature Algorithm for Blockchain Cryptocurrency Transaction Security.Dogonyaro, Noel, M.; Ahmad, S.; Isah, A. O.; Subairu, S. O.
2020Empirical Design Framework for Development of Convolutional Neural Network Based ModelSubairu, S. O.; Alhassan, J. K.; Abdulhamid, S. M.; Ojeniyi, J. A.
2020Formulation of Quick Response Code Dataset for Machine learning Analysis.Subairu, S. O.; Alhassan, J. K.; Abdulhamid, S. M.; Ojeniyi, J.A
2017The Imperatives of Electrical Redundancy and Contingency Design for Critical Sections in a University Power Supply NetworkIsah, Abdulkadir Onivehu; Alhassan, J. K.; Subairu, S. O.; Tola, O. J.; Ambafi, J. G.
2024-08-15A NOVEL DEEP BELIEF-BASED MODEL FOR THE INTRUSION DETECTION OF NETWORK TRAFFICSule, Aishat A.; Alhassan, John K.; Ismaila, I.; Alabi, I. O.; Subairu, S. O.
2017-05A Proposed Model for Dynamic Graphical Password Integration into ATM AuthenticationSubairu, S. O.; Alhassan, J. K.; Waziri, V. O
2024Stack Ensemble Model For Detection Of Phishing WebsiteWabi, H. A.; Ojeniyi, Joseph Adebayo; Ismaila, Idris; Subairu, S. O.
2025-02-18Systematic Review on Stateful Hash-Based Digital Signature SchemeBello, Zainab Lapai; Ismail, Idris; Joseph, A. Ojeniyi; Isah, A. O.; Subairu, S. O.