Cyber Security Science : [151] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 151
Issue DateTitleAuthor(s)
2023A Machine Learning Approach to Fake News Detection Using Support Vector Machine (SVM) and Unsupervised Learning ModelHosea, I. G.; Waziri, V. O.; Ismaila, Idris; Ojeniyi, Joseph Adebayo; Olalere, Morufu; Adebayo, O. S.
2024Learners’ Privacy-Preserving Scheme for Ranking Data Sensitivity in Mobile Learning SystemMuhammad, M. K.; Olaniyi, O. M.; Osang, F.; Oyefolahan, I. O.; Ojeniyi, Joseph Adebayo; Kolo, I. M.
2024Stack Ensemble Model For Detection Of Phishing WebsiteWabi, H. A.; Ojeniyi, Joseph Adebayo; Ismaila, Idris; Subairu, S. O.
2024Comparative analysis of SVM kernels for DDOS attack detection in SDNAbdullahi, Aishatu Wabi; Ismaila, Idris; Olaniyi, O. M.; Ojeniyi, Joseph Adebayo; Adebayo, O. S.; Mishra, A
2020A Panacea to soft computing approach for Sinkhole attack classification in a wireless sensor networks environmentNwankwo, K. E.; Abdulhamid, S. M.; Ojeniyi, Joseph Adebayo; Misra, S; Oluranti, J.; Ahuja, R.
2025-02-18Systematic Review on Stateful Hash-Based Digital Signature SchemeBello, Zainab Lapai; Ismail, Idris; Joseph, A. Ojeniyi; Isah, A. O.; Subairu, S. O.
2024-03-27Diffie Hell-man Key Exchange Encryption Mechanism for Securing Data from Man-in-The-Middle Attack.Olowo, Sunday.; Idris, Ismaila.; Olawale, Surajudeen, Adebayo.; Joseph, Ojeniyi. Adebayo,; Isah, A. O.; Subairu, S.O.
2021An Enhanced FFT Algorithm: Framework for Keystrokes Acoustic Emanations Denoising Approach on Real-Time EnvironmentAhmad, Suleiman; Alhassan, John Kolo; Abdulhamid, Shafi'i Muhammad; Zubair, Suleiman
2010OPNET IT GURU Academic Edition toEnhance Networking Education in Nigeria UniversitiesZubair, Suleiman; Ahmad, Suleiman; AbdulAzeez, Hassan T.; Salihu, Bala A.
2024Designing an email header analysis tool for cyber threat intelligenceAbdulazeez, Hassan. T.; Ahmad, Suleiman; Raji, A.; Maliki, D.
2019-07ICT ARCHITECTURE FOR NATIONAL SECURITYAlabi, I.O.; Ojeniyi, J.A.; Ismail, A.A.; Ahmad, S. I; Abdulazeez, H.T.
2023-10-16Detection Of Ransomware Using Process-Behaviour Analysis And Machine Learning Techniques-
2023-10-16The Digital Evidence Acquisition Challenges In Infrastructure-As-A-Service(Iaas) Cloud Model: A Systematic Literature Review-
2023-10-16A Vunerability Detector For Hyperledger Fabric Smart Contract Using Chaincode AnalyzerAdamu Shamsudeen Kulho, Victor Onomza Waziri, Ismaila Idris, Joseph Adebayo Ojeniyi, Sikiru Olanrewaju Subairu
2017-10-17Comparative Analysis of the Accuracy of Forensic Results obtained from Window and Android PlatformsAlhassan, John K.; Abdulazeez, Hassan T.; Ahmad, Suleiman; Abdulhamid, Shafi'i Muhammad; Adebayo, Olawale S.
2023DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION TECHNIQUE BASE ON ARTIFICIAL NEUTRAL NETWORKS: SYSTEMATIC LITERATURE REVIEWAbdul-karim Baba Oshoma; Morufu Olalere; Ismaila Idris; Joseph Adebayo Ojeniyi; Abdulkadir Onivehu Isah
2023A SYSTEMATIC LITERATURE REVIEW OF CLOUD RADIO ACCESS NETWORK AND NETWORK SLICING TECHNOLOGY ON 5GW. M Jonah; J. K. Alhassani; Ismaila Idris; J. A. Ojeniyi; O. S. Adebayo; A. O. Isah
2023SYSTEMATIC LITERATURE REVIEW OF ATTACK ON MEDICAL CYBERPHYSICAL SYSTEMS (MCPS)Michael, O. U.; Waziri, V. O.; Ismaila Idris.; Ojeniyi, J. A.,; Adebayo, O. S.; Isah, A. O.
2024A Comprehensive Review on Techniques, Tools and Open Issue in Blockchain and Smart Contract DevelopmentHafiz O. Haruna; Ismaila Idris; Joseph Ojeniyi; Abdulkadir O. Isah; Sikiru O. Subaiyru
2024A SYSTEMATIC LITERATURE REVIEW OF DIGITAL FORENSIC INVESTIGATION METHODOLOGIES: TRENDS, FRAMEWORKS, TECHNIQUES, CHALLENGES, SOLUTIONS AND OPEN ISSUESMasu’d Balarabe; Ismaila Idris; Joseph Ojeniyi; Abdulkadir Onivehu Isah
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 151