Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 146
Issue Date | Title | Author(s) |
2025-02-18 | Systematic Review on Stateful Hash-Based Digital Signature Scheme | Bello, Zainab Lapai; Ismail, Idris; Joseph, A. Ojeniyi; Isah, A. O.; Subairu, S. O. |
2024-03-27 | Diffie Hell-man Key Exchange Encryption Mechanism for Securing Data from Man-in-The-Middle Attack. | Olowo, Sunday.; Idris, Ismaila.; Olawale, Surajudeen, Adebayo.; Joseph, Ojeniyi. Adebayo,; Isah, A. O.; Subairu, S.O. |
2021 | An Enhanced FFT Algorithm: Framework for Keystrokes Acoustic Emanations Denoising Approach on Real-Time Environment | Ahmad, Suleiman; Alhassan, John Kolo; Abdulhamid, Shafi'i Muhammad; Zubair, Suleiman |
2010 | OPNET IT GURU Academic Edition toEnhance Networking Education in Nigeria Universities | Zubair, Suleiman; Ahmad, Suleiman; AbdulAzeez, Hassan T.; Salihu, Bala A. |
2024 | Designing an email header analysis tool for cyber threat intelligence | Abdulazeez, Hassan. T.; Ahmad, Suleiman; Raji, A.; Maliki, D. |
2019-07 | ICT ARCHITECTURE FOR NATIONAL SECURITY | Alabi, I.O.; Ojeniyi, J.A.; Ismail, A.A.; Ahmad, S. I; Abdulazeez, H.T. |
2023-10-16 | Detection Of Ransomware Using Process-Behaviour Analysis And Machine Learning Techniques | - |
2023-10-16 | The Digital Evidence Acquisition Challenges In Infrastructure-As-A-Service(Iaas) Cloud Model: A Systematic Literature Review | - |
2023-10-16 | A Vunerability Detector For Hyperledger Fabric Smart Contract Using Chaincode Analyzer | Adamu Shamsudeen Kulho, Victor Onomza Waziri, Ismaila Idris, Joseph Adebayo Ojeniyi, Sikiru Olanrewaju Subairu |
2017-10-17 | Comparative Analysis of the Accuracy of Forensic Results obtained from Window and Android Platforms | Alhassan, John K.; Abdulazeez, Hassan T.; Ahmad, Suleiman; Abdulhamid, Shafi'i Muhammad; Adebayo, Olawale S. |
2023 | DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION TECHNIQUE BASE ON ARTIFICIAL NEUTRAL NETWORKS: SYSTEMATIC LITERATURE REVIEW | Abdul-karim Baba Oshoma; Morufu Olalere; Ismaila Idris; Joseph Adebayo Ojeniyi; Abdulkadir Onivehu Isah |
2023 | A SYSTEMATIC LITERATURE REVIEW OF CLOUD RADIO ACCESS NETWORK AND NETWORK SLICING TECHNOLOGY ON 5G | W. M Jonah; J. K. Alhassani; Ismaila Idris; J. A. Ojeniyi; O. S. Adebayo; A. O. Isah |
2023 | SYSTEMATIC LITERATURE REVIEW OF ATTACK ON MEDICAL CYBERPHYSICAL SYSTEMS (MCPS) | Michael, O. U.; Waziri, V. O.; Ismaila Idris.; Ojeniyi, J. A.,; Adebayo, O. S.; Isah, A. O. |
2024 | A Comprehensive Review on Techniques, Tools and Open Issue in Blockchain and Smart Contract Development | Hafiz O. Haruna; Ismaila Idris; Joseph Ojeniyi; Abdulkadir O. Isah; Sikiru O. Subaiyru |
2024 | A SYSTEMATIC LITERATURE REVIEW OF DIGITAL FORENSIC INVESTIGATION METHODOLOGIES: TRENDS, FRAMEWORKS, TECHNIQUES, CHALLENGES, SOLUTIONS AND OPEN ISSUES | Masu’d Balarabe; Ismaila Idris; Joseph Ojeniyi; Abdulkadir Onivehu Isah |
2022 | Cryptocurrency Fraud Detection: A systematic Literature review | Hussaini, Y,; Waziri, V.O.; Isah, A. O.; Ojeniyi, J A |
2019-07 | ICT ARCHITECTURE FOR NATIONAL SECURITY | Alabi, I. O; Ojeniyi, J. A; Ismail, A. A; Ahmad, Suleiman; Abdulazeez, Hassan T. |
2010-11-08 | Design of a Trapdoor for Password Access | Ahmad, Suleiman; Zubair, Suleiman.; Abdulazeez, Hassan. T; Salihu, Bala A.; Idris, L.; Ibrahim, A. |
2010-11-06 | Integrating OPNET IT Guru to Enhance Networking Education in Nigerian Universities. | Zubair, Suleiman; Ahmad, Suleiman.; Abdulazeez, Hassan. T; Salihu, Bala A. |
2023-04-08 | Cybersecurity Infrastructure Defense and Capacity Review for Nigeria with Digital Economy Impact | Ismaila, Idris, .; Uduimoh, Andrew Anogie; Omeiza, Haruna Hafiz |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 146