Collection's Items (Sorted by Submit Date in Descending order): 121 to 140 of 248
Issue Date | Title | Author(s) |
2019-04-02 | Whale optimization algorithm-based email spam feature selection method using rotation forest algorithm for classification | Maryam, Shuaib; Shafi’i, Muhammad Abdulhamid; Olawale, Surajudeen Adebayo; Oluwafemi, Osho; Ismaila, Idris; John, K. Alhassan; Nadim, Rana |
2016-11-28 | Securing File on Cloud Computing System using Encryption Software: A Comparative Analysis | Victor, O. Waziri; John, K. Alhassan; Ismaila, Idris; Raji, Abdullahi Egigogo |
2019-03 | Secure University Network Architecture, Vulnerabilities, Risk Priority Level Classification And Countermeasures | Ismaila, Idris; Muhammad, Umar Majigi; Shafi'i, Muhammad Abdulhamid; Morufu, Olalere; Muhammad, Bashir Abdullahi; Vivian, O. Nwaocha |
2018-11 | Security Risk Analysis and Management in Online Retailing Transactions, using Konga as a case study | Joshua, Edward Mamza; Ismaila, Idris; Joseph, A.Ojeniyi; Shafii, M. Abdulhamid |
2018-04 | Privacy Preserving Classification Over Encrypted Data Using Fully Homomorphic Encryption Technique | Abdullahi, Monday Jubrin; Victor, Onomza Waziri; Muhammad, Bashir Abdullahi; Ismaila, Idris |
2015-02 | Plastic Financial Fraud In The Most Populated Black Africa; Nigeria:The Mitigation Based-On One-Time Password | Waziri, Victor Onomza; John, Alhassan; Ismaila, Idris; Abdulrahman, Tunde |
2019 | Performance Evaluation of Machine Learning Algorithms for Hypertext Transfer Protocol Distributed Denial of Service Intrusion Detection | Rukayya, Umar; Morufu, Olalere; Ismaila, Idris; Raji, Abdullahi Egigogo; Bolarin, G |
2019-12 | Random Forest Based Hypertext Transfer Protocol Distributed Denial of Service Attack Detection System for Cloud Computing Environment | Morufu, Olalere; Rukayya, Umar; Juliana, Ndunagu; Ismaila, Idris; Raji, Abdullahi Egigogo; Suleiman, Muhammad Nasir |
2014-08-08 | Cyber Security Education: A Tool for National Security | Morufu, Olalere; Dr. Victor, O. Waziri; Ismaila, Idris; Olawale, S. Adebayo; Joel, N. Ugwu |
2014-06 | Assessment of Information Security Awareness among Online Banking Costumers in Nigeria | Morufu, Olalere; Victor, O. Waziri; Ismaila, Idris; Olawale, S. Adebayo; Ololade, O. |
2018 | A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection Attack | Morufu, Olalere; Raji, Abdullahi Egigogo; Ojeniyi, Joseph A.; Ismaila, Idris; Rasheed, Gbenga Jimoh |
2012-01 | Model and Algorithm in Artificial Immune System for Spam Detection | Ismaila, Idris |
2018-12 | Secure Electronic Medical Records Transmission using NTRU Cryptosystem and LSB in Audio Steganography | Adamu, Abdulkadir; Shafi’i, Muhammad Abdulhamid; Oluwafem, Osho; Ismaila, Idris; John, K Alhassan |
2011-08 | Security Application In Bluetooth Technology | Ismaila, Idris; Morufu, O. |
2018-12 | A Proposed Model For Users’ Authentication Of Attendance System Towards Curtailing Fraud In Public Sector | Ismaila, Idris; Ilyas, Adeleke Jimoh; Ishola, D. Muraina |
2012 | E-mail Spam Classification With Artificial Neural Network and Negative Selection Algorithm | Ismaila, Idris |
2018-04-08 | Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniques | Joseph, A. Ojeniyi; Bolaji, O. Adedayo; Ismaila, Idris; Abdulhamid, M. Shafi’i |
2017 | HTTP Flood Mitigation Using Gateway Inspection and Second Chance Approach | Ismaila, Idris; Ogidiagba, Jones Tobi; Victor, O. Waziri; John, K. Alhassan; Ojeniyi, Joseph |
2019-06 | Forensic Analysis of Mobile Banking Applications In Nigeria | Andrew, A. Uduimoh; Oluwafemi, Osho; Ismaila, Idris; Shafi'i, M. Abdulhamid |
2017-12-04 | Distributed Denial of Service Detection using Multi Layered Feed Forward Artificial Neural Network | Ismaila, Idris; Obi, Blessing Fabian; Shafi’i, M. Abdulhamid; Morufu, Olalere; Baba, Meshach |
Collection's Items (Sorted by Submit Date in Descending order): 121 to 140 of 248