Cyber Security Science : [151] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 151
Issue DateTitleAuthor(s)
2023-03-22Two-layer Secured Graphical Authentication with One Time Password (OTP) Verification for a Web Based ApplicationsAdebayo, Olawale Surajudeen; Ganiyu, Shefiu Olusegun; Alli, Adam A; Rufai, Salihu Ahmed; Jubril, Abdullahi Monday; Abdulazeez, Lateefah; Gadzama, Emmanuel Hamman
2023-03-22Cyber-attacks and Impacts on the Educational Cyber InfrastructuresAdebayo, Olawale Surajudeen
2022-08-26Systematic Review of Session Hijacking Attacks on 5G NetworkAbdulkarim, Muhammad Kabir; Adebayo, Olawale Surajudeen; Abdulhamid, Shafii Muhammad; Bashir, Sulaimon Adebayo
2022-12Android malware detection: A systematic Literature reviewOjeniyi, Joseph Adebayo; Hussaini, Y.; Umar, M.; Abdullazeez, A.; Oladipupo, S.F.
2018A Genetically Optimized Model in Determining Applications for Desired Stream CiphersEdward, J. M.; Alhassan, J. K.; Ojeniyi, Joseph Adebayo
2916Development of a Traffic Analyzer for the Detection of DDoS Attack SourceOjeniyi, Joseph Adebayo; Balogun, M.O.; Fasola, S; Ugochukwu, O
2014Improved Data Security Framework Based on Advanced Encryption Standard and FingerprintOjeniyi, Joseph Adebayo; Waziri, V.O.; Idris, S
2014A Simple Encryption and Decryption System.Osho, O.; Zubair, Y.O.; Ojeniyi, Joseph Adebayo
2017Protecting the CoreOsho, O.; Ojeniyi, Joseph Adebayo; Abdulhmid, S. M.
2021An Intelligent Model for Detecting the Sensitivity Sentiments in Learners’ Profile on Learning Management SystemMuhammad, M.K.; Ishaq, O. O.; Olayemi, M. O.; Ojeniyi, Joseph Adebayo
2019-07Security Risk Analysis and Management in a Non-Interest Banking SectorOjeniyi, Joseph Adebayo; Samuel, A.O.; Abdulhmid, S. M.
2018Quantum Cryptography – Currend Methods and TechnologyGadzama, E.H.; Adebayo, O.S.; Ojeniyi, Joseph Adebayo
2015Enhanced information hiding using symmetric encryption techniques and least significant bits steganographic design approachOjeniyi, Joseph Adebayo; Adeniji, A.B.; Idris, S.; Ganiyu, S. O.; Alabi, I. O.
2021Privacy Preservation in Mobile-Based Learning Systems: Current Trends, Methodologies, Challenges, Opportunities and Future DirectionMuhammad, M.K; Oyefolahan, I.O.; Olaniyi, O.M.; Ojeniyi, Joseph Adebayo
2020Recognition Based Graphical Password Algorithms: A SurveyKaka, J. G.; Ishaq, O. O.; Ojeniyi, Joseph Adebayo
2020Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin transactionsNoel, M. D.; Waziri, V.O.; Abdulhmid, S. M.; Ojeniyi, Joseph Adebayo; Okoro, M.U.
2020A Review of DNA Cryptographic ApproachesIliyasu, M.A.; Abisoye, O.A.; Bashir, S.A.; Ojeniyi, Joseph Adebayo
2020A Review of Detection Methodologies for Quick Response code Phishing AttacksSubairu, S; Alhassan, J.K.; Abdulhmid, S. M.; Ojeniyi, Joseph Adebayo
2019A SYSTEMATIC LITERATURE REVIEW ON DIGITAL EVIDENCE ADMISSIBILITY: METHODOLOGIES, CHALLENGES AND RESEARCH DIRECTIONSEdward, E.O.; Ojeniyi, Joseph Adebayo
2019Stateful Hash-based Digital Signature Schemes for Bitcoin CryptocurrencyNoel, M.D.; Waziri, V.O.; Abdulhmid, S. M.; Ojeniyi, Joseph Adebayo
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 151