Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 151
Issue Date | Title | Author(s) |
2020-11-24 | A Review of Detection Methodologies for Quick Response code Phishing Attacks | Subairu, S.O; Alhassan, J.K; Abdulhamid, S.M; Ojeniyi, J.A |
2017 | The Imperatives of Electrical Redundancy and Contingency Design for Critical Sections in a University Power Supply Network | Isah, Abdulkadir Onivehu; Alhassan, J.K; Subairu, S.O; Tola, O.J; Ambafi, J.G |
2020-12-29 | Integrity Assurance for Small Scale Digital Devices Based Evidence for Cyber Crime Investigation | Muhammad, M. K.; Ismaila, Idris; Lukman, I. |
2016 | INTEGRATION OF PARENTAL ALERT SYSTEM INTO STUDENTS’ ONLINE PAYMENT SYSTEM | Isah, Abdulkadir Onivehu; Alhassan, J. K; Waziri, Victor O.; Lawal, K. H. |
2016 | Network System Design for Combating Cybercrime in Nigeria | Isah, Abdulkadir Onivehu; Alhassan, J. K.; Sanjay, Misra; Idris, I; Crawford, Broderick; Soto, Ricardo |
2018 | Development of a Secured e-Voting System with OTP as Second Order Authentication | Salami, Habu J.; Adebayo, O. S.; Isah, Abdulkadir Onivehu; Lawal, K. H.; Alhassan, J. K. |
2017 | The Imperatives of Electrical Redundancy and Contingency Design for Critical Sections in a University Power Supply Network | Isah, Abdulkadir Onivehu; Alhassan, J. K.; Subairu, S. O.; Tola, O. J.; Ambafi, J. G. |
2018 | Detection of a Real-time Cyber-attack using Locator Agent Algorithm | Isah, Abdulkadir Onivehu; Alhassan, J. K; Idris, I.; Adebayo, O. S. |
2019 | Investigation of Vulnerability of Oil and Gas Critical Infrastructures and Developing a tracking Algorithm to track malicious attacks on the streams | Isah, Abdulkadir Onivehu; Alhassan, J. K.; Idris, I.; Adebayo, O. S.; Onuja, A. M. |
2015 | Multi-Layer Access Control for Bring Your Own Device Environment | Olalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol |
2016 | Real-Time Malware Uniform Resource Locator Detection: Identification of Novel Discriminative Features through Manual Examination and Empirical Analysis | Olalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol |
2016 | Identification and Evaluation of Discriminative Lexical Features of Malware URL for Real-Time Classification | Olalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol |
2017 | Real-time Malware URL detection system based on Multi-layer Perceptron Neural Networks | Abdullah, Mohd Taufik; Olalere, Morufu; Mahmod, Ramlan; Abdullah, Azizol |
2017 | Forensic Acquisition of Data from a Crypt 12 Encrypted Database of Whatsapps | Alhassan, John K; Abubakar, Bilikisu; Olalere, Morufu; Abdulhamid, Shafi'i Muhammad; Ahmed, suleiman |
2017 | Mitigation of Sybil Attack on A Campus Network (Canet) Using Inter-Arrival Time Threshold and Physical Address Comparison | Waziri, Onomza Victor; Jimoh, Balikis Bukola; Olalere, Morufu; Abdulhamid, Shafi'I Muhammad; Idris, Ismaila |
2018 | A Systematic Literature Review on Detection, Prevention and Classification with Machine Learning Approach | Olalere, Morufu; Egigogo, Raji Abdullahi; Umar, Rukayya; Abdulhamid, Shafi'i Muhammad |
2019-06 | Comparative Analysis of Performance of Different Machine Learning Algorithms for Prediction of Success of Bank Telemarketing | Mohammed, Aliyu Aishatu; Olalere, Morufu; Mohammed, Abdullahi Ibrahim |
2016 | A Review of Top Open Source Password Cracking Tools | Yisa, Victor; Baba, Meshach; Olaniyi, Emmanuel |
2019-09 | Performance Evaluation of Ant Lion Optimization and Particle Swarm Optimiztion for Uncapacitated Facility Location Problem (UFLP) | Shehu, Hussaina; Olalere, Morufu |
2019-10 | Detection of Distributed Denial of Service (DDoS) with Linear Support Vector Machine | Nnaba, Yisa Rhoda; Olalere, Morufu |
Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 151