Cyber Security Science : [248] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 248
Issue DateTitleAuthor(s)
2016A Critical Analysis of Component-Based Software EngineeringSubairu, Sikiru Olanrewaju
2016-11Evaluating Capabilities Of Rootkits ToolsSubairu, Sikiru; Alhassan, John; Sanjay, Misra
2018SQL Injection Attack: A Systematic Literature Review on Detection, Prevention and Classification with Machine Learning Approach” 1st International Conference on ICT for National Development and Its Sustainability, Faculty of Communication and Information Sciences, University of Ilorin 2018.yisa, victor; raji, egigogo; Abdulhamid, Shafi'i
2012The Challenges of Missing Results of E-Examination in Nigerian Universities.Shitu, Kelani; Surajudeen, Adebayo; Yisa, Victor; Baba, meshach
2012THE SIMULATION OF PATH CONTROL AND ROUTE REDISTRIBUTION TECHNIQUES ON THE INTEGRATION OF WANs WITH DIFFERENT ROUTING PROTOCOLSAbdulhamid, Shafi'i; Yisa, Victor; Baba, meshach; Njoku, Collins
2018Password Knowledge versus Password Management PracticeAdama, Victor; Noel, Moses; Yisa, victor; Baba, meshach; Ekunday, Ayobami
2015Novel Solution for Addressing Identity Theft and Cheating in Electronic Examinations using Mouse DynamicsBaba, meshach; Yisa, victor
2019Towards a Digital Policing in Developing Nations: The Nigerian ContextIsmaila, Idris; Yisa, Victor; Ikuesan, Richard; Shakah, Imavah
2018-06A DIAGNOSIS SYSTEM FOR LASSA FEVER AND RELATED AILMENTS USING FUZZY LOGICAminu, Enesi Femi; Abiodun, Ahmed Ajani; Isah, Omeiza Rabiu; Anda, Ilyasu; Isah, Abdulkadir Onivehu; Zubairu, Hussaini Abubakar
2017Comparative Performance Study of Antimalware Tools on TDL-4 RootkitSubairu, S. O.; Isah, Abdulkadir Onivehu; Alhassan, J. K.
2017Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on TransitionIsah, Abdulkadir Onivehu; Alhassan, J. K; Olanrewaju, S. S; Aminu, Enesi Femi
2013-11Design and Construction of Wireless Personal Computer based Fuel Level Monitoring SystemTola, O. J.; Ambafi, A. J.; Isah, Abdulkadir Onivehu; Inyang, E.O
2020-09-17Tracking of Malicious Attacks on Data Online: A Systematic ReviewIsah, Abdulkadir Onivehu; Alhassan, John Kolo; Idris, Ismail; Adebayo, Olawale Surajudeen
2011-01Conficker: An Enviable Threat for Computer to Computer and Internet SystemAdebayo, Olawale Surajudeen; Mishra, Amit; Mabayoje, Modina A.; Abikoye, O. C.; Olagunju, Mukaila
2014Big Data Analytics and the Epitome of fully Homomorphic Encryption Scheme for Cloud Computing SecurityVictor, O. Waziri; John, K. Alhassan; Olalere, Morufu; Ismaila, Idris
2014-09-09Active Defence: An Evolving Gaming Strategy for Attacker Defender in a Network EnvironmentWaziri, Victor Onomza; Anuonye, Stanley Obinna; Olalere, Morufu; Ismaila, Idris
2017Vulnerability Assessment of Some Key Nigeria Government Websites 1Ismaila, Idris; Mohammad, Umar Majigi; Shafii, Abdulhamid; Morufu, Olalere; Saidu, Isah Rambo
2020-09-17Tracking of Malicious Attacks on Data Online: A Systematic ReviewIsah, Abdulkadir Onivehu; Alhassan, John Kolo; Ismaila, Idris; Adebayo, Olawale Surajudeen
2014-12Tasks scheduling technique using league championship Algorithm for makespan minimization in iaas cloudShafi’i, Muhammad Abdulhamid; Muhammad, Shafie Abd Latiff; Ismaila, Idris
2016-11-28SIM Cards Forensic Capability and Evaluation of Extraction ToolsIsmaila, Idris; John, K. Alhassan; Victor, O. Wa; Muhammad, Umar Majigi
Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 248