Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 151
    
    
    
| Issue Date | Title | Author(s) | 
| 2020-11-24 | A Review of Detection Methodologies for Quick Response code Phishing Attacks | Subairu, S.O; Alhassan, J.K; Abdulhamid, S.M; Ojeniyi, J.A | 
| 2017 | The Imperatives of Electrical Redundancy and Contingency Design for Critical Sections in a University Power Supply Network | Isah, Abdulkadir Onivehu; Alhassan, J.K; Subairu, S.O; Tola, O.J; Ambafi, J.G | 
| 2020-12-29 | Integrity Assurance for Small Scale Digital Devices Based Evidence for Cyber Crime Investigation | Muhammad, M. K.; Ismaila, Idris; Lukman, I. | 
| 2016 | INTEGRATION OF PARENTAL ALERT SYSTEM INTO STUDENTS’ ONLINE  PAYMENT SYSTEM | Isah, Abdulkadir Onivehu; Alhassan, J. K; Waziri, Victor O.; Lawal, K. H. | 
| 2016 | Network System Design for Combating Cybercrime in Nigeria | Isah, Abdulkadir Onivehu; Alhassan, J. K.; Sanjay, Misra; Idris, I; Crawford, Broderick; Soto, Ricardo | 
| 2018 | Development of a Secured e-Voting System with OTP as Second Order Authentication | Salami, Habu J.; Adebayo, O. S.; Isah, Abdulkadir Onivehu; Lawal, K. H.; Alhassan, J. K. | 
| 2017 | The Imperatives of Electrical Redundancy and Contingency Design for Critical Sections in a University Power Supply Network | Isah, Abdulkadir Onivehu; Alhassan, J. K.; Subairu, S. O.; Tola, O. J.; Ambafi, J. G. | 
| 2018 | Detection of a Real-time Cyber-attack using Locator Agent Algorithm | Isah, Abdulkadir Onivehu; Alhassan, J. K; Idris, I.; Adebayo, O. S. | 
| 2019 | Investigation of Vulnerability of Oil and Gas Critical Infrastructures and Developing a tracking Algorithm to track malicious attacks on the streams | Isah, Abdulkadir Onivehu; Alhassan, J. K.; Idris, I.; Adebayo, O. S.; Onuja, A. M. | 
| 2015 | Multi-Layer Access Control for Bring Your Own Device Environment | Olalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol | 
| 2016 | Real-Time Malware Uniform Resource Locator Detection: Identification of Novel Discriminative Features through Manual Examination and Empirical Analysis | Olalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol | 
| 2016 | Identification and Evaluation of Discriminative Lexical Features of Malware URL for Real-Time Classification | Olalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol | 
| 2017 | Real-time Malware URL detection system based on Multi-layer Perceptron Neural Networks | Abdullah, Mohd Taufik; Olalere, Morufu; Mahmod, Ramlan; Abdullah, Azizol | 
| 2017 | Forensic Acquisition of Data from a Crypt 12 Encrypted Database of Whatsapps | Alhassan, John K; Abubakar, Bilikisu; Olalere, Morufu; Abdulhamid, Shafi'i Muhammad; Ahmed, suleiman | 
| 2017 | Mitigation of Sybil Attack on A Campus Network (Canet) Using Inter-Arrival Time Threshold and Physical Address Comparison | Waziri, Onomza Victor; Jimoh, Balikis Bukola; Olalere, Morufu; Abdulhamid, Shafi'I Muhammad; Idris, Ismaila | 
| 2018 | A Systematic Literature Review on Detection, Prevention and Classification with Machine Learning Approach | Olalere, Morufu; Egigogo, Raji Abdullahi; Umar, Rukayya; Abdulhamid, Shafi'i Muhammad | 
| 2019-06 | Comparative Analysis of Performance of Different Machine Learning  Algorithms for Prediction of Success of Bank Telemarketing | Mohammed, Aliyu Aishatu; Olalere, Morufu; Mohammed, Abdullahi Ibrahim | 
| 2016 | A Review of Top Open Source Password Cracking Tools | Yisa, Victor; Baba, Meshach; Olaniyi, Emmanuel | 
| 2019-09 | Performance Evaluation of Ant Lion  Optimization and Particle Swarm Optimiztion for Uncapacitated Facility Location  Problem (UFLP) | Shehu, Hussaina; Olalere, Morufu | 
| 2019-10 | Detection of Distributed Denial of  Service (DDoS) with Linear Support Vector Machine | Nnaba, Yisa Rhoda; Olalere, Morufu | 
    
    
        Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 151