Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 248
Issue Date | Title | Author(s) |
2016 | A Critical Analysis of Component-Based Software Engineering | Subairu, Sikiru Olanrewaju |
2016-11 | Evaluating Capabilities Of Rootkits Tools | Subairu, Sikiru; Alhassan, John; Sanjay, Misra |
2018 | SQL Injection Attack: A Systematic Literature Review on Detection, Prevention and Classification with Machine Learning Approach” 1st International Conference on ICT for National Development and Its Sustainability, Faculty of Communication and Information Sciences, University of Ilorin 2018. | yisa, victor; raji, egigogo; Abdulhamid, Shafi'i |
2012 | The Challenges of Missing Results of E-Examination in Nigerian Universities. | Shitu, Kelani; Surajudeen, Adebayo; Yisa, Victor; Baba, meshach |
2012 | THE SIMULATION OF PATH CONTROL AND ROUTE REDISTRIBUTION TECHNIQUES ON THE INTEGRATION OF WANs WITH DIFFERENT ROUTING PROTOCOLS | Abdulhamid, Shafi'i; Yisa, Victor; Baba, meshach; Njoku, Collins |
2018 | Password Knowledge versus Password Management Practice | Adama, Victor; Noel, Moses; Yisa, victor; Baba, meshach; Ekunday, Ayobami |
2015 | Novel Solution for Addressing Identity Theft and Cheating in Electronic Examinations using Mouse Dynamics | Baba, meshach; Yisa, victor |
2019 | Towards a Digital Policing in Developing Nations: The Nigerian Context | Ismaila, Idris; Yisa, Victor; Ikuesan, Richard; Shakah, Imavah |
2018-06 | A DIAGNOSIS SYSTEM FOR LASSA FEVER AND RELATED AILMENTS USING FUZZY LOGIC | Aminu, Enesi Femi; Abiodun, Ahmed Ajani; Isah, Omeiza Rabiu; Anda, Ilyasu; Isah, Abdulkadir Onivehu; Zubairu, Hussaini Abubakar |
2017 | Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit | Subairu, S. O.; Isah, Abdulkadir Onivehu; Alhassan, J. K. |
2017 | Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on Transition | Isah, Abdulkadir Onivehu; Alhassan, J. K; Olanrewaju, S. S; Aminu, Enesi Femi |
2013-11 | Design and Construction of Wireless Personal Computer based Fuel Level Monitoring System | Tola, O. J.; Ambafi, A. J.; Isah, Abdulkadir Onivehu; Inyang, E.O |
2020-09-17 | Tracking of Malicious Attacks on Data Online: A Systematic Review | Isah, Abdulkadir Onivehu; Alhassan, John Kolo; Idris, Ismail; Adebayo, Olawale Surajudeen |
2011-01 | Conficker: An Enviable Threat for Computer to Computer and Internet System | Adebayo, Olawale Surajudeen; Mishra, Amit; Mabayoje, Modina A.; Abikoye, O. C.; Olagunju, Mukaila |
2014 | Big Data Analytics and the Epitome of fully Homomorphic Encryption Scheme for Cloud Computing Security | Victor, O. Waziri; John, K. Alhassan; Olalere, Morufu; Ismaila, Idris |
2014-09-09 | Active Defence: An Evolving Gaming Strategy for Attacker Defender in a Network Environment | Waziri, Victor Onomza; Anuonye, Stanley Obinna; Olalere, Morufu; Ismaila, Idris |
2017 | Vulnerability Assessment of Some Key Nigeria Government Websites 1 | Ismaila, Idris; Mohammad, Umar Majigi; Shafii, Abdulhamid; Morufu, Olalere; Saidu, Isah Rambo |
2020-09-17 | Tracking of Malicious Attacks on Data Online: A Systematic Review | Isah, Abdulkadir Onivehu; Alhassan, John Kolo; Ismaila, Idris; Adebayo, Olawale Surajudeen |
2014-12 | Tasks scheduling technique using league championship Algorithm for makespan minimization in iaas cloud | Shafi’i, Muhammad Abdulhamid; Muhammad, Shafie Abd Latiff; Ismaila, Idris |
2016-11-28 | SIM Cards Forensic Capability and Evaluation of Extraction Tools | Ismaila, Idris; John, K. Alhassan; Victor, O. Wa; Muhammad, Umar Majigi |
Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 248