Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 151
Issue Date | Title | Author(s) |
2023 | A Machine Learning Approach to Fake News Detection Using Support Vector Machine (SVM) and Unsupervised Learning Model | Hosea, I. G.; Waziri, V. O.; Ismaila, Idris; Ojeniyi, Joseph Adebayo; Olalere, Morufu; Adebayo, O. S. |
2024 | Learners’ Privacy-Preserving Scheme for Ranking Data Sensitivity in Mobile Learning System | Muhammad, M. K.; Olaniyi, O. M.; Osang, F.; Oyefolahan, I. O.; Ojeniyi, Joseph Adebayo; Kolo, I. M. |
2024 | Stack Ensemble Model For Detection Of Phishing Website | Wabi, H. A.; Ojeniyi, Joseph Adebayo; Ismaila, Idris; Subairu, S. O. |
2024 | Comparative analysis of SVM kernels for DDOS attack detection in SDN | Abdullahi, Aishatu Wabi; Ismaila, Idris; Olaniyi, O. M.; Ojeniyi, Joseph Adebayo; Adebayo, O. S.; Mishra, A |
2020 | A Panacea to soft computing approach for Sinkhole attack classification in a wireless sensor networks environment | Nwankwo, K. E.; Abdulhamid, S. M.; Ojeniyi, Joseph Adebayo; Misra, S; Oluranti, J.; Ahuja, R. |
2025-02-18 | Systematic Review on Stateful Hash-Based Digital Signature Scheme | Bello, Zainab Lapai; Ismail, Idris; Joseph, A. Ojeniyi; Isah, A. O.; Subairu, S. O. |
2024-03-27 | Diffie Hell-man Key Exchange Encryption Mechanism for Securing Data from Man-in-The-Middle Attack. | Olowo, Sunday.; Idris, Ismaila.; Olawale, Surajudeen, Adebayo.; Joseph, Ojeniyi. Adebayo,; Isah, A. O.; Subairu, S.O. |
2021 | An Enhanced FFT Algorithm: Framework for Keystrokes Acoustic Emanations Denoising Approach on Real-Time Environment | Ahmad, Suleiman; Alhassan, John Kolo; Abdulhamid, Shafi'i Muhammad; Zubair, Suleiman |
2010 | OPNET IT GURU Academic Edition toEnhance Networking Education in Nigeria Universities | Zubair, Suleiman; Ahmad, Suleiman; AbdulAzeez, Hassan T.; Salihu, Bala A. |
2024 | Designing an email header analysis tool for cyber threat intelligence | Abdulazeez, Hassan. T.; Ahmad, Suleiman; Raji, A.; Maliki, D. |
2019-07 | ICT ARCHITECTURE FOR NATIONAL SECURITY | Alabi, I.O.; Ojeniyi, J.A.; Ismail, A.A.; Ahmad, S. I; Abdulazeez, H.T. |
2023-10-16 | Detection Of Ransomware Using Process-Behaviour Analysis And Machine Learning Techniques | - |
2023-10-16 | The Digital Evidence Acquisition Challenges In Infrastructure-As-A-Service(Iaas) Cloud Model: A Systematic Literature Review | - |
2023-10-16 | A Vunerability Detector For Hyperledger Fabric Smart Contract Using Chaincode Analyzer | Adamu Shamsudeen Kulho, Victor Onomza Waziri, Ismaila Idris, Joseph Adebayo Ojeniyi, Sikiru Olanrewaju Subairu |
2017-10-17 | Comparative Analysis of the Accuracy of Forensic Results obtained from Window and Android Platforms | Alhassan, John K.; Abdulazeez, Hassan T.; Ahmad, Suleiman; Abdulhamid, Shafi'i Muhammad; Adebayo, Olawale S. |
2023 | DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION TECHNIQUE BASE ON ARTIFICIAL NEUTRAL NETWORKS: SYSTEMATIC LITERATURE REVIEW | Abdul-karim Baba Oshoma; Morufu Olalere; Ismaila Idris; Joseph Adebayo Ojeniyi; Abdulkadir Onivehu Isah |
2023 | A SYSTEMATIC LITERATURE REVIEW OF CLOUD RADIO ACCESS NETWORK AND NETWORK SLICING TECHNOLOGY ON 5G | W. M Jonah; J. K. Alhassani; Ismaila Idris; J. A. Ojeniyi; O. S. Adebayo; A. O. Isah |
2023 | SYSTEMATIC LITERATURE REVIEW OF ATTACK ON MEDICAL CYBERPHYSICAL SYSTEMS (MCPS) | Michael, O. U.; Waziri, V. O.; Ismaila Idris.; Ojeniyi, J. A.,; Adebayo, O. S.; Isah, A. O. |
2024 | A Comprehensive Review on Techniques, Tools and Open Issue in Blockchain and Smart Contract Development | Hafiz O. Haruna; Ismaila Idris; Joseph Ojeniyi; Abdulkadir O. Isah; Sikiru O. Subaiyru |
2024 | A SYSTEMATIC LITERATURE REVIEW OF DIGITAL FORENSIC INVESTIGATION METHODOLOGIES: TRENDS, FRAMEWORKS, TECHNIQUES, CHALLENGES, SOLUTIONS AND OPEN ISSUES | Masu’d Balarabe; Ismaila Idris; Joseph Ojeniyi; Abdulkadir Onivehu Isah |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 151