Cyber Security Science : [151] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 151
Issue DateTitleAuthor(s)
2020-11-24A Review of Detection Methodologies for Quick Response code Phishing AttacksSubairu, S.O; Alhassan, J.K; Abdulhamid, S.M; Ojeniyi, J.A
2017The Imperatives of Electrical Redundancy and Contingency Design for Critical Sections in a University Power Supply NetworkIsah, Abdulkadir Onivehu; Alhassan, J.K; Subairu, S.O; Tola, O.J; Ambafi, J.G
2020-12-29Integrity Assurance for Small Scale Digital Devices Based Evidence for Cyber Crime InvestigationMuhammad, M. K.; Ismaila, Idris; Lukman, I.
2016INTEGRATION OF PARENTAL ALERT SYSTEM INTO STUDENTS’ ONLINE PAYMENT SYSTEMIsah, Abdulkadir Onivehu; Alhassan, J. K; Waziri, Victor O.; Lawal, K. H.
2016Network System Design for Combating Cybercrime in NigeriaIsah, Abdulkadir Onivehu; Alhassan, J. K.; Sanjay, Misra; Idris, I; Crawford, Broderick; Soto, Ricardo
2018Development of a Secured e-Voting System with OTP as Second Order AuthenticationSalami, Habu J.; Adebayo, O. S.; Isah, Abdulkadir Onivehu; Lawal, K. H.; Alhassan, J. K.
2017The Imperatives of Electrical Redundancy and Contingency Design for Critical Sections in a University Power Supply NetworkIsah, Abdulkadir Onivehu; Alhassan, J. K.; Subairu, S. O.; Tola, O. J.; Ambafi, J. G.
2018Detection of a Real-time Cyber-attack using Locator Agent AlgorithmIsah, Abdulkadir Onivehu; Alhassan, J. K; Idris, I.; Adebayo, O. S.
2019Investigation of Vulnerability of Oil and Gas Critical Infrastructures and Developing a tracking Algorithm to track malicious attacks on the streamsIsah, Abdulkadir Onivehu; Alhassan, J. K.; Idris, I.; Adebayo, O. S.; Onuja, A. M.
2015Multi-Layer Access Control for Bring Your Own Device EnvironmentOlalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol
2016Real-Time Malware Uniform Resource Locator Detection: Identification of Novel Discriminative Features through Manual Examination and Empirical AnalysisOlalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol
2016Identification and Evaluation of Discriminative Lexical Features of Malware URL for Real-Time ClassificationOlalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol
2017Real-time Malware URL detection system based on Multi-layer Perceptron Neural NetworksAbdullah, Mohd Taufik; Olalere, Morufu; Mahmod, Ramlan; Abdullah, Azizol
2017Forensic Acquisition of Data from a Crypt 12 Encrypted Database of WhatsappsAlhassan, John K; Abubakar, Bilikisu; Olalere, Morufu; Abdulhamid, Shafi'i Muhammad; Ahmed, suleiman
2017Mitigation of Sybil Attack on A Campus Network (Canet) Using Inter-Arrival Time Threshold and Physical Address ComparisonWaziri, Onomza Victor; Jimoh, Balikis Bukola; Olalere, Morufu; Abdulhamid, Shafi'I Muhammad; Idris, Ismaila
2018A Systematic Literature Review on Detection, Prevention and Classification with Machine Learning ApproachOlalere, Morufu; Egigogo, Raji Abdullahi; Umar, Rukayya; Abdulhamid, Shafi'i Muhammad
2019-06Comparative Analysis of Performance of Different Machine Learning Algorithms for Prediction of Success of Bank TelemarketingMohammed, Aliyu Aishatu; Olalere, Morufu; Mohammed, Abdullahi Ibrahim
2016A Review of Top Open Source Password Cracking ToolsYisa, Victor; Baba, Meshach; Olaniyi, Emmanuel
2019-09Performance Evaluation of Ant Lion Optimization and Particle Swarm Optimiztion for Uncapacitated Facility Location Problem (UFLP)Shehu, Hussaina; Olalere, Morufu
2019-10Detection of Distributed Denial of Service (DDoS) with Linear Support Vector MachineNnaba, Yisa Rhoda; Olalere, Morufu
Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 151