Cyber Security Science : [151] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 151
Issue DateTitleAuthor(s)
2014-04-12League Championship Algorithm Based Job Scheduling Scheme for Infrastructure as a Service CloudAbdulhamid, Shafi’i Muhammad; Abd Latiff, Shafi’i Muhammad
2012-06-10An Improved AIS Based E-mail Classification Technique for Spam DetectionIDRIS, ISMAILA; Abdulhamid, Shafi’i Muhammad
2014-08-20Grid-based Search Technique for Massive Academic PublicationsBashir, Mohammad Bakri; Muhammad Shafie, Abd Latiff; Abdulhamid, Shafi’i Muhammad; Loon, C. T.
2018-03-20Secure Electronic Medical Records Transmission in Audio using NTRU Cryptosystem with Least Significant Bit Steganographic TechniqueAbdulkadir, Adamu; Abdulhamid, Shafi’i Muhammad; Oluwafemi, Osho; John, K. Alhassan; Ismaila, Idris
2019-05-13Nature Inspired Meta-Heuristic Algorithms for Deep Learning: Recent Progress and Novel PerspectiveChiroma, Haruna; Abdulsalam, Yau Gital; Abubakar, Adamu; Abdulhamid, Shafi’i Muhammad; Nadim, Rana
2020-04-20Comparative Performance Analysis of Anti-virus SoftwareMoses, Noel Dogonyaro; Victor, Waziri Onomza; Abdulhamid, Shafi’i Muhammad; Obada, S. L.
2020-04-01Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin transactionsMoses, Noel Dogonyaro; Victor, Waziri Onomza; Abdulhamid, Shafi’i Muhammad; Joseph, Ojeniyi Adebayo; Okoro, Malvis Ugonna
2020-07-02Smart Home Automation System Using ZigBee, Bluetooth and Arduino TechnologiesTaiwo, O.,; Ezugwu, A. E.,; Rana, N.; Abdulhamid, Shafi’i Muhammad
2020-03-02A Review of Detection Methodologies for Quick Response code Phishing AttacksSikiru, Subairu; John, Alhassan; Abdulhamid, Shafi’i Muhammad; Ojeniyi, Joseph
2020-08-12An Intelligent Machine Learning-Based Real-Time Public Transport SystemSkhosana, M.; Ezugwu, A. E.; Rana, N.; Abdulhamid, Shafi’i Muhammad
2020-03-20Genetic Search Wrapper-Based Naïve Bayes Anomaly Detection Model for Fog Computing EnvironmentOnah, J; Abdulhamid, Shafi’i Muhammad; Misra, Shafi’i Muhammad; Sharma, M. M.,; Rana, N.; Oluranti, J.
2020-12-03Antlion Optimization-Based Feature Selection Scheme for Cloud Intrusion Detection Using Naïve Bayes AlgorithmChristopher, Haruna Atabo; Abdulhamid, Shafi’i Muhammad; Misra, Sanjay; Odun-Ayo, I.; Sharma, M. M.
2019-09Investigation of Vulnerability of Oil and Gas Critical Infrastructures and Developing a Tracking Algorithm to track Malicious Attacks on the StreamsIsah, Abdulkadir O.; Alhassan, John K; Ismaila, Idris; Adebayo, Olawale Surajudeen; Onuja, Abdulkadir S.
2019Investigation of Vulnerabilities of Oil and Gas Critical Infrastructures and Developing a Tracking Algorithm to Track Malicious Attacks on the Stream.Isah, O.A; Alhassan, J.K; Ismaila, Idris; Adebayo, O. S; Onuja, A. M
2021Sooner Lightweight cryptosystem: Towards Privacy Preservation of Resource-Constrained DevicesAlfa, Abraham Ayegba; Alhassan, John Kolo; Olaniyi, Olayemi Mikail; Olalere, Morufu
2020Analysis and Comparison of Key Revocation Protocols in Wireless Sensor NetworkTaofeek, Yusuf; Waziri, Victor Onomza; Abdullahi, Bashir Mohammed; Olalere, Morufu
2018Detection of a Real-time Cyber-attack using Locator Agent Algorithm (C006)Isah, Abdulkadir Onivehu; Alhassan, J.K; Ismaila, Idris; Adebayo, O. Surajudeen
2011-12-14Negative Selection Algorithm In Artificial Immune System For Spam DetectionIsmaila, Idris; Ali, Selamat
2016-07Network System Design for Combating Cybercrime in NigeriaIsah, A.O; Alhassan, J.K; Sanjay, Misra; Ismaila, Idris; Broderick, Crawford; Ricardo, Soto
2017-10Mitigation of Sybil Attack on A Campus Network (CANET) Using Inter-Arrival Time Threshold and Physical Address ComparisonVictor, Onomza Waziri; Morufu, Olalere; Shafi’i, Muhammad A.; Ismaila, Idris
Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 151