Collection's Items (Sorted by Submit Date in Descending order): 181 to 190 of 190
| Issue Date | Title | Author(s) |
| 2018 | Comparative Evaluation of Mobile Forensic Tools | Alhassan, J. K.; Oguntoye, R. T; Misra, Sanjay; Adewumi, Adewole; Maskeliunas, Rytis; DamaĊĦevicius, Robertas |
| 2016 | Development of Second-Level Authentication Process for A Higher Level Security in ATM Transactions | Alhassan, J. K.; Ochoche, A; Enagi, A. M; Shefiu, G. M; Muhammad-Bello, B. L. |
| 2016-11 | Integration of Parental Alert System into Students Online Payment System | Isah, A. O.; Alhassan, J. K.; Waziri, Victor O.; Lawal, K.H. |
| 2016-11 | SIM Cards Forensic Capability and Evaluation of Extraction Tools | Idris, Ismaila; Alhassan, J. K.; Waziri, Victor O.; Majigi, Muhammad Umar |
| 2016-11 | Threat Modeling of Electronic Health Systems and Mitigating Countermeasures | Alhassan, J. K.; Abba, Emmanuel; Olaniyi, O. M.; Waziri, Victor O. |
| 2016-11 | Data Loss Prevention and Challenges Faced in their Deployments | Waziri, Victor O.; Ismaila, Idris; Alhassan, J. K.; Adedayo, Bolaji O. |
| 2016-11 | Securing File on Cloud Computing System using Encryption Software: A Comparative Analysis | Waziri, Victor O.; Alhassan, J. K.; Ismaila, Idris; Raji, Abdullahi Egigogo |
| 2016-11 | A Secure Method to Hide Confidential Data Using Cryptography and Steganography | Alhassan, J. K.; Ismaila, Idris; Waziri, Victor O.; Abdulkadir, Adamu |
| 2016-11 | An Infallible Technique for Hiding Confidential Data in Compressed Video using LSB and RSA Algorithm | Idris, Ismaila; Onoja, Emmanuel Oche; Alhassan, J. K. |
| 2012 | Artificial Neural Network as Kernel of Image Analysis Software. | Nedvedz, A.; Alhassan, J. K.; Belotserkovsky, A |
Collection's Items (Sorted by Submit Date in Descending order): 181 to 190 of 190