Collection's Items (Sorted by Submit Date in Descending order): 121 to 140 of 151
Issue Date | Title | Author(s) |
2015-11 | Novel Solution for Addressing Identity Theft and Cheating in Electronic Examinations using Mouse Dynamics | Baba, Meshach; Yisa, Victor L. |
2016-11 | A Review of Top Open Source Password Cracking Tools | Baba, Meshach; Yisa, Victor L.; Olaniyi, Emmanuel Tosin |
2015 | Mobile Spamming In Nigeria, an Empirical Survey | Oluwafemi, Osho; Yisa, Victor; Ogunleke, Olasunkanmi; Abdulhamid, Shafi'i |
2019 | Enhanced Decision Tree-J48 with SMOTE Machine Learning Algorithm for Effective Botnet Detection | Adeleke, Ilyas; Ismaila, Idris; Olalere, Morufu |
2019 | Performance Evaluation of Machine Learning Algorithms for Hypertext Transfer Protocol Distributed Denial of Service Intrusion Detection | Umar, Rukaya; Olalere, Morufu; Idris, Ismaila; Egigogo, Raji Abdullahi; Bolarin, G, |
2019 | Machine Learning Approach for Detection of Spam Url: Performance Evaluation of Selected Algorithms | Okpanachi, Ahiaba Moses; Olalere, Morufu |
2019-12 | A Systematic Literature Review: Application, Challenges and Technology of Blockchain in Healthcare | Nnaba, Y. R.; Olalere, Morufu; Ojeniyi, J. A. |
2018-06-10 | Hybrid gradient descent cuckoo search (HGDCS) algorithm for resource scheduling in IaaS cloud computing environment | Madni, Syed Hamid Hussain; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i Muhammad; Ali, Javed |
2020-07 | Comparative Analysis of Machine Learning Classifiers for Detecting Malware in Portable Executable File | Nanven, Fadan David; Olalere, Morufu |
2021-02 | Students Academic Performance Prediction Based on Square Root Data Transformation and Ensemble Technique | Abdullahi, Wokili; Olalere, Morufu |
2021-02 | Analysis of Cybercrime in Nigeria | Muhammad, Abubakar Idris; Hamisu, Muhammad; Mansour, Ali; Olalere, Morufu |
2021-03 | Comparative Study: Machine Learning Classification Algorithms for Backdoor Detection | Abdullahi, Lawal; Olalere, Morufu |
2021 | Sooner Lightweight cryptosystem: Towardss Privacy Preservation of Resource-Constrained Devices. | Alfa, Abraham Ayegba; Alhassan, John Kolo; Olaniyi, Olayemi Mikail; Olalere, Morufu |
2018-12 | Quantum Cryptography – Currend Methods and Technology. 11th – 13th December, 2018 | Gadzama, Emmanuel H; Adebayo, Olawale Surajudeen; Ojeniyi, Joseph A. |
2020 | Tracking of Malicious Attacks on Data Online: A Systematic Review | Isah, Abdulkadir O.; Alhassan, John K; Ismaila, Idris; Adebayo, Olawale Surajudeen |
2019 | Development of a Secured e-voting system with OTP as Second Order Authentication. | Habu, Salami J.; Adebayo, Olawale S.; Isah, Abdulkadir O.; Lawal, Kehinde H.; Alhassan, John K. |
2021 | Medical Expert System for Diagnosis and Remedy for Infectious Diseases. | Yahaya, M.S; Lawal, R.D; Etuk, S.O; Hussaini, A.Z; Noel, M.D |
2018 | Evaluation of Mobile Banking Services Usage: A case Study of Niger State. | Baba, M.; Noel, M.D; Yisa, L.V; Olatunde, M.O |
2019 | Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency | Noel, M D; Waziri, O.V; Abdulhamid, M.S; Ojeniyi, A.J |
2020 | Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin Transactions. | Noel, M.D; Waziri, O.V; Abdulhamid, M.S; Ojeniyi, A.J |
Collection's Items (Sorted by Submit Date in Descending order): 121 to 140 of 151