Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 151
Issue Date | Title | Author(s) |
2019 | Effective Policing Apparatus in Nigeria: The Place of Forensic Soundness | Alhassan, J.K.; Muhammed, A.A.; Iwokhagh, N.; Aibinu, A.M.; Ojeniyi, Joseph Adebayo |
2018 | Risk Analysis and Management in Airline Transportation Using Jumia Air Travel as a Case Stu | Gadzama, E.H.; Adedayo, O.S.; Ojeniyi, Joseph Adebayo; Abdulhamid, S. M. |
2016 | Integrity-Based Evaluation of Forensic Tools on Android Jelly Beans | Ojeniyi, Joseph Adebayo; Alhassan, J. K.; Ojerinde, O.A.; Ahmad, S; Okeke, O.C.; Ojeniyi, A.A. |
2015 | Digital Forensic Analysis for Enhancing Information Security | Ojeniyi, Joseph Adebayo; Idris, S; Abdulmalik, Y. A.; Ganiyu, S. O.; Alabi, I. O. |
2020-05 | Identification of Best Machine Learning Algorithms for Detection of HTTP Botnet Attack | Olalere, M; Yisa, R. N.; Ojeniyi, Joseph Adebayo; Nwaocha, V. O. |
2019 | Phishing attack detection based on random forest with wrapper feature selection method | Abdulrahamn, M.D.; Alhassan, J. K.; Adebayo, O. S.; Ojeniyi, Joseph Adebayo; Olalere, M |
2018 | A FRAMEWORK FOR PHYSICAL HOME SECURITY USING MOBILE INTRUSION DETECTION SYSTEM | Ganiyu, S.O.; Ismail, A; Ojeniyi, Joseph Adebayo; Adediran, T |
2018 | Development of a Predictive Model for the Detection of CAPTCHA Smuggling Attacks using Supervised Deep Learning based Approach | Omoyele, M; Ojeniyi, Joseph Adebayo; Adebayo, O. S. |
2020 | Intelligent based Framework for Detection of Fake News in Social Media Platforms | Olusanjo, F; Ojeniyi, Joseph Adebayo; Oyeniyi, S |
2013-11-26 | Online Priority Aware streaming framework for Cognitive Radio Sensor Networks | Zubair, Suleiman; Fisal, Norsheila; Maqbool, Wajahat; AbdulAzeez, Hassan T. |
2017-10-17 | Comparative Analysis of the Accuracy of Forensic Results obtained from Window and Android Platforms | John, K Alhassan; AbdulAzeez, Hassan T.; Suleiman, Ahnad; Shafi'i, Muhammad Abdulhamid; Olawale, S Adebayo |
2008-08-02 | A review of intrution detection system architectures in mobile ad hoc networks | Abdulhamid, Shafi’i Muhammad |
2017-06-20 | Protecting the Core | Oluwafemi, Osho; Joseph, A. Ojeniyi; Abdulhamid, Shafi’i Muhammad |
2015-06-20 | Mobile Spamming in Nigeria: An Empirical Survey | Oluwafemi, Osho; Yisa, V. L.; Ogunleke, O. Y.; Abdulhamid, Shafi’i Muhammad |
2019-08-13 | Performance Analysis of Security Information and Event Management Solutions Detecting Web-Based Attacks | Morufu, Olalere; Juliana, Ndunagu; Abdulhamid, Shafi’i Muhammad; Odey, Peter |
2019-03-12 | Sinkhole attack detection in a wireless sensor networks using enhanced ant colony optimization to improve detection rate | Nwankwo, Kenneth E.; Abdulhamid, Shafi’i Muhammad |
2019-07-13 | Security Risk Analysis and Management in a Non-Interest Banking Sector | Joseph, A. Ojeniyi; Samuel, A. Oyeniyi; Abdulhamid, Shafi’i Muhammad |
2019-07-02 | Machine Learning Classification Algorithms for Phishing Detection: A Comparative Appraisal and Analysis | Noah, Ndakotsu Gana; Abdulhamid, Shafi’i Muhammad |
2019-07-04 | Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency | Moses, Noel Dogonyaro; Victor, Waziri Onomza; Abdulhamid, Shafi’i Muhammad; Joseph, Ojeniyi Adebayo |
2016-04-02 | Optimal resource scheduling technique for IaaS Cloud computing | Madni, Syed Hamid Hussain; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i Muhammad |
Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 151