Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 151
Issue Date | Title | Author(s) |
2022 | Cryptocurrency Fraud Detection: A systematic Literature review | Hussaini, Y,; Waziri, V.O.; Isah, A. O.; Ojeniyi, J A |
2019-07 | ICT ARCHITECTURE FOR NATIONAL SECURITY | Alabi, I. O; Ojeniyi, J. A; Ismail, A. A; Ahmad, Suleiman; Abdulazeez, Hassan T. |
2010-11-08 | Design of a Trapdoor for Password Access | Ahmad, Suleiman; Zubair, Suleiman.; Abdulazeez, Hassan. T; Salihu, Bala A.; Idris, L.; Ibrahim, A. |
2010-11-06 | Integrating OPNET IT Guru to Enhance Networking Education in Nigerian Universities. | Zubair, Suleiman; Ahmad, Suleiman.; Abdulazeez, Hassan. T; Salihu, Bala A. |
2023-04-08 | Cybersecurity Infrastructure Defense and Capacity Review for Nigeria with Digital Economy Impact | Ismaila, Idris, .; Uduimoh, Andrew Anogie; Omeiza, Haruna Hafiz |
2023-04-18 | Cybersecurity Infrastructure Defense and Capacity Review for Nigeria with Digital Economy Impact. | Ismaila, Idris; Andrew, Anogie Uduimoh; Hafiz, Omeiza Haruna |
2021 | Integration Of Consortium Blockchain Model In The Nigerian Banking Sector | Ojerinde, O. A.; Salawu, J.; A., Abisoye O.; A., Uduimoh, A. |
2019 | Forensic Analysis of Mobile Banking Apps | Osho, O.; Mohammed, U. L.; Nimzing, N. N.; Uduimoh, A. A; Misra, S |
2019-03-01 | Effective Policing Apparatus in Nigeria: The Place of Forensic Soundness | John, Alhassan,; Adamu, Muhammed; N, Iwokhagh; Musa, Aibinu; Joseph, Ojeniyi; A., Uduimoh |
2019 | AbsoluteSecure: A Tri-Layered Data Security System | Osho, O.; Musa, F. A.; Misra, S.; Uduimoh, A. A.; Adewunmi, A.; Ahuja, R. |
2022-11-01 | Ring Learning With Error-Based Encryption Scheme for the Privacy of Electronic Health Records Management | Abdulkadir, U; Waziri, V.O; Alhassan, J.K; Ismaila, I |
2023 | Systematic Literature Review on Android Malware Detection | Anyaora, P.C; Adebayo, O.S; Ismaila, I; Ojeniyi, J.A; Olalere, M |
2023 | Hate and Offensive Speech Detection Using Term Frequency- Inverse Document Frequency (TF-IDF) and Majority Voting Ensemble Machine Learning Algorithms | Okechukwu, C; Idris, I; Ojeniyi, J.A; Olalere, M; Adebayo, 0.S |
2023-03-23 | Systematic Literature Review on Application Program Interface based Android Malware Detection | Emmanuel, Ehoda; Olawale, Surajudeen Adebayo; Idris, Ismaila; Joseph, Ojeniyi; Morufu, Olalere |
2021-12-06 | Online Examination Proctoring for Quality Assurance in the Post COVID-19 Pandemic New Normal | Jubril, Abdullah Monday; Adebayo, Olawale Surajudeen; Achimugu, Philips; Abah, Joshua; Egwu, Samuel |
2018-10-24 | Risk Analysis and Management In Airline Transportation Using Jumia Air Travel As A Case | Gadzama, Emmanuel Hamman; Adebayo, Olawale Surajudeen; Ojeniyi, Joseph; Abdulhamid, Shafii Muhammad |
2023-03-22 | Hate and Offensive Speech Detection Using Term Frequency-Inverse Document Frequency (TF-IDF) and Majority Voting Ensemble Machine Learning Algorithms | Okechukwu, Chukwuemeka; Ismaila, Idris; Ojeniyi, Joseph; Olalere, Morufu; Adebayo, Olawale Surajudeen |
2023-03-22 | Systematic Literature Review on Android Malware Detection | Anyaora, Peter C.; Adebayo, Olawale Surajudeen; Ismaila, Idris; Ojeniyi, Joseph; Olalere, Morufu |
2023-03-22 | Systematic Literature Review on Application Program Interface based Android Malware Detection | Ehoda, Emmanuel; Adebayo, Olawale Surajudeen; Ismaila, Idris; Ojeniyi, Joseph; Olalere, Morufu |
2023-03-22 | Cloud Data Security Audit Report Techniques Using Bat Inspired Algorithm (CDSART-BA): A Review | Abdulkarim, Onuja M.; Adebayo, Olawale Surajudeen; Aliyu, Hamzat Olanrewaju; Olalere, Morufu |
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 151