Collection's Items (Sorted by Submit Date in Descending order): 221 to 240 of 264
| Issue Date | Title | Author(s) |
| 2007 | An Evaluation of Internet Connectivity of Information Technology Firms in Minna Metropolis | Adepoju, Solomon Adelowo; Alhassan, J. K. |
| 2010-08 | Challenges of Automated Teller Machine (ATM) Usage and Fraud Occurrences in Nigeria – A Case Study of Selected Banks in Minna Metropolis | Adepoju, Solomon Adelowo; Alhassan, Mohammed Enagi |
| 2012-12 | Forecasting Nigeria Foreign Exchange Rates Using Artificial Neural Network | Alhassan, J. K.; Misra, S; Ogwueleka, F; Inyiama, H. C. |
| 2010 | Performance Evaluation of the Wireless Local Area Networks (WLAN) of Federal University of Technology, Minna, Bosso Campus | Alhassan, J. K.; Hakimi, D |
| 2009 | An Evaluation of Information Technology (IT) Usage Among Undergraduate Students: A Case Study of Federal University of Technology Minna | Alhassan, J. K. |
| 2008 | An Evaluation of Cost-Effectiveness of Micro Computerized Documentation System/Integrated Set of Information System (CDS/ISIS) Software of Raw Materials Research and Development Council (RMRDC), Abuja | Alhassan, J. K.; Aliu, G |
| 2008 | Perception of Students About Online Registration: A Case Study of Federal University of Technology, Minna | Adepoju, S. A; Alhassan, J. K. |
| 2020-09 | A Comparative Experimental Evaluation of the Detection Rates and Removal Abilities of Fifteen Malware Detector Tools on Xpaj.MBR Rootkit | Subairu, S. O.; Alhassan, J. K.; Nwaocha, V. O.; Saidu, I. R. |
| 2020 | Empirical Design Framework for Development of Convolutional Neural Network Based Model | Subairu, S. O.; Alhassan, J. K.; Abdulhamid, S. M.; Ojeniyi, J. A. |
| 2020 | Formulation of Quick Response Code Dataset for Machine learning Analysis. | Subairu, S. O.; Alhassan, J. K.; Abdulhamid, S. M.; Ojeniyi, J.A |
| 2019-11 | Development of multiple mobile networks call detailed records and its forensic analysis | Abba, Emmanuel; Aibinu, A. M.; Alhassan, J. K. |
| 2019-12 | Phishing Attack Detection Based on Random Forest with Wrapper Feature Selection Method | Abdulrahaman, Musbau Dogo; Alhassan, J. K.; Adebayo, Olawale Surajudeen; Ojeniyi, Ojeniyi A.; Olalere, Morufu |
| 2019 | Development of a Secured E-Voting System With OTP as Second Order Authentication | Salam, H. J; Adebayo, O. S.; Isah, A. O.; Lawal, K. H; Alhassan, J. K. |
| 2019 | Ensemble Learning Approach for the Enhancement of Performance of Intrusion Detection System | Abdulrahaman, Musbau Dogo; Alhassan, J. K. |
| 2018 | Forecasting Reasons for Students’ Health Failure in Tertiary Institutions | Alhassan, J. K.; Adebanjo, S.; Sanjay, M.; Damaševičius, Robertas; Maskeliūnas, Rytis |
| 2018-12 | Security Risk Analysis and Management in mobile wallet transaction: A Case study of Pagatech Nigeria Limited | Abdulrahaman, Musbau D.; Alhassan, J. K.; Ojeniyi, Joseph A.; Abdulhamid, Shafii M. |
| 2018-01 | Comparative Analysis of Classification Algorithms for Email Spam Detection | Abdulhamid, Shafi’i Muhammad; Shuaib, Maryam; Osho, Oluwafemi; Ismaila, Idris; Alhassan, J. K. |
| 2017-06-29 | Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit | Subairu, S. O; Isah, A. O; Alhassan, J. K. |
| 2017-11 | Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on Transition | Isah, A. O.; Alhassan, J. K.; Olanrewaju, S. S; Aminu, Enesi Femi |
| 2017 | HTTP Flood Mitigation Using Gateway Inspection and Second Chance Approach Analysis | Idris, Ismaila; Ogidiagba, Jones Tobi; Waziri, Victor O.; Alhassan, J. K.; Ojeniyi, Joseph |
Collection's Items (Sorted by Submit Date in Descending order): 221 to 240 of 264