Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 151
Issue Date | Title | Author(s) |
2014-04-12 | League Championship Algorithm Based Job Scheduling Scheme for Infrastructure as a Service Cloud | Abdulhamid, Shafi’i Muhammad; Abd Latiff, Shafi’i Muhammad |
2012-06-10 | An Improved AIS Based E-mail Classification Technique for Spam Detection | IDRIS, ISMAILA; Abdulhamid, Shafi’i Muhammad |
2014-08-20 | Grid-based Search Technique for Massive Academic Publications | Bashir, Mohammad Bakri; Muhammad Shafie, Abd Latiff; Abdulhamid, Shafi’i Muhammad; Loon, C. T. |
2018-03-20 | Secure Electronic Medical Records Transmission in Audio using NTRU Cryptosystem with Least Significant Bit Steganographic Technique | Abdulkadir, Adamu; Abdulhamid, Shafi’i Muhammad; Oluwafemi, Osho; John, K. Alhassan; Ismaila, Idris |
2019-05-13 | Nature Inspired Meta-Heuristic Algorithms for Deep Learning: Recent Progress and Novel Perspective | Chiroma, Haruna; Abdulsalam, Yau Gital; Abubakar, Adamu; Abdulhamid, Shafi’i Muhammad; Nadim, Rana |
2020-04-20 | Comparative Performance Analysis of Anti-virus Software | Moses, Noel Dogonyaro; Victor, Waziri Onomza; Abdulhamid, Shafi’i Muhammad; Obada, S. L. |
2020-04-01 | Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin transactions | Moses, Noel Dogonyaro; Victor, Waziri Onomza; Abdulhamid, Shafi’i Muhammad; Joseph, Ojeniyi Adebayo; Okoro, Malvis Ugonna |
2020-07-02 | Smart Home Automation System Using ZigBee, Bluetooth and Arduino Technologies | Taiwo, O.,; Ezugwu, A. E.,; Rana, N.; Abdulhamid, Shafi’i Muhammad |
2020-03-02 | A Review of Detection Methodologies for Quick Response code Phishing Attacks | Sikiru, Subairu; John, Alhassan; Abdulhamid, Shafi’i Muhammad; Ojeniyi, Joseph |
2020-08-12 | An Intelligent Machine Learning-Based Real-Time Public Transport System | Skhosana, M.; Ezugwu, A. E.; Rana, N.; Abdulhamid, Shafi’i Muhammad |
2020-03-20 | Genetic Search Wrapper-Based Naïve Bayes Anomaly Detection Model for Fog Computing Environment | Onah, J; Abdulhamid, Shafi’i Muhammad; Misra, Shafi’i Muhammad; Sharma, M. M.,; Rana, N.; Oluranti, J. |
2020-12-03 | Antlion Optimization-Based Feature Selection Scheme for Cloud Intrusion Detection Using Naïve Bayes Algorithm | Christopher, Haruna Atabo; Abdulhamid, Shafi’i Muhammad; Misra, Sanjay; Odun-Ayo, I.; Sharma, M. M. |
2019-09 | Investigation of Vulnerability of Oil and Gas Critical Infrastructures and Developing a Tracking Algorithm to track Malicious Attacks on the Streams | Isah, Abdulkadir O.; Alhassan, John K; Ismaila, Idris; Adebayo, Olawale Surajudeen; Onuja, Abdulkadir S. |
2019 | Investigation of Vulnerabilities of Oil and Gas Critical Infrastructures and Developing a Tracking Algorithm to Track Malicious Attacks on the Stream. | Isah, O.A; Alhassan, J.K; Ismaila, Idris; Adebayo, O. S; Onuja, A. M |
2021 | Sooner Lightweight cryptosystem: Towards Privacy Preservation of Resource-Constrained Devices | Alfa, Abraham Ayegba; Alhassan, John Kolo; Olaniyi, Olayemi Mikail; Olalere, Morufu |
2020 | Analysis and Comparison of Key Revocation Protocols in Wireless Sensor Network | Taofeek, Yusuf; Waziri, Victor Onomza; Abdullahi, Bashir Mohammed; Olalere, Morufu |
2018 | Detection of a Real-time Cyber-attack using Locator Agent Algorithm (C006) | Isah, Abdulkadir Onivehu; Alhassan, J.K; Ismaila, Idris; Adebayo, O. Surajudeen |
2011-12-14 | Negative Selection Algorithm In Artificial Immune System For Spam Detection | Ismaila, Idris; Ali, Selamat |
2016-07 | Network System Design for Combating Cybercrime in Nigeria | Isah, A.O; Alhassan, J.K; Sanjay, Misra; Ismaila, Idris; Broderick, Crawford; Ricardo, Soto |
2017-10 | Mitigation of Sybil Attack on A Campus Network (CANET) Using Inter-Arrival Time Threshold and Physical Address Comparison | Victor, Onomza Waziri; Morufu, Olalere; Shafi’i, Muhammad A.; Ismaila, Idris |
Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 151