Collection's Items (Sorted by Submit Date in Descending order): 141 to 160 of 248
Issue Date | Title | Author(s) |
2018 | Digital Forensics Model for Mobile VoIP Cloud Computing Investigation | Joshua, Edward Mamza; Ismaila, Idris |
2010 | Design evaluation of some nigerian university portals: A programmers point of view | Abdulhamid, Shafi’i Muhammad; Ismaila, Idris |
2016-11-26 | Data Loss Prevention and Challenges Faced in their Deployments | Victor, O. Waziri; Ismaila, Idris; John, K. Alhassan; Bolaji, O. Adedayo |
2018-01-08 | Comparative Analysis of Classification Algorithms for Email Spam Detection | Shafi’i, Muhammad Abdulhamid; Maryam, Shuaib; Oluwafemi, Osho; Ismaila, Idris; John, K. Alhassan |
2020-08 | Biometry, Encryption and Spyware (BES): A Multi-factor Security and Authentication Mechanism for JAMB E-Examination | Amadi, Rapheal Sunday; Ismaila, Idris; Hussaini, Abubakar Zubairu; Stella, Oluyemi Etuk; Idris, Mohammed Kolo |
2015 | Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption | Victor, Onomza Waziri; John, K. Alhassan; Ismaila, Idris; Moses, Noel Dogonyaro |
2018-07 | Android malware classification using whale optimization algorithm | Sulaiman, Salamatu Aliyu; Olawale, Surajudeen Adebayo; Ismaila, Idris; Sulaimon, A. Bashir |
2019-03 | An intelligent crypto-locker ransomware detection technique using support vector machine classification and grey wolf optimization algorithms | Ismaila, Idris; Shafi’i, Muhammad Abdulhamid; Morufu, Olalere; Abdullahi, Muhammad Maigida |
2016-11-28 | An Infallible Technique for Hiding Confidential Data in Compressed Video using LSB and RSA Algorithm | Ismaila, Idris; Onoja, Emmanuel Oche; John, K. Alhassan |
2012-02-23 | An Improved AIS Based E-mail Classification Technique for Spam Detection | Ismaila, Idris; Abdulhamid, Shafi’i Muhammad |
2015 | A Swarm Negative Selection Algorithm for Email Spam Detection | Ismaila, Idris; Ali, Selamat |
2015 | A combined negative selection algorithm–particle swarm optimization for an email spam detection system | Ismaila, Idris; Ali, Selamat; Ngoc, Thanh Nguyen; Sigeru, Omatu; Ondrej, Krejcar; Kamil, Kuca; Marek, Penhaker |
2016 | Online Social Networks: A Survey of Usage and Risks Experience among University Students in North-Central Nigeria | Yisa, Victor; Oluwafemi, Osho; Soje, Isaac |
2018 | Application of Geo-Location-Based Access Control in an Enterprise Environment | Yisa, Victor; Baba, Meshach; Oluwafemi, Osho; Sule, Anthony |
2016-11-28 | A Secure Method to Hide Confidential Data Using Cryptography and Steganography | John K., Alhassan; Ismaila, Idris; Victor. O, Waziri; Adamu, Abdulkadir |
2013 | A Negative Selection Algorithm Based on Email Classification Techniques | Victor O., Waziri; Ismaila, Idris; Mohammed Bashir, Abdullahi; Hakimi, Danladi; Audu, Isah |
2018 | A Forensic Evidence Recovery from Mobile Device Applications | John K., Alhassan; Agbejule, Gbolahan; Ismaila, Idris; Mohammed Abdulhamid, Shafii; Victor O., Onomza |
2018 | Security Risk Analysis and Management in Electronic Payment Switching System in Nigeria, eTranzact International Plc. as a Case Study | Adeleke Jimoh, Ilyas; Ojeniyi . A, Joseph; Ismaila, Idris |
2019-05 | Towards a Digital Policing in Developing Nations: The Nigerian Context. | Ismaila, Idris; Yisa, Victor; Adeyemi, R. Ikuesan; Apodoghe Imavah, Shaka; Mohammad . B, Abdullahi; Abduldayan, Fatimah; Baba, Meshach |
2016-07-04 | Fault tolerance aware scheduling technique for cloud computing environment using dynamic clustering algorithm | Abdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Madni, Syed Hamid Hussain; Abdullahi, Mohammed |
Collection's Items (Sorted by Submit Date in Descending order): 141 to 160 of 248