Cyber Security Science : [248] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 141 to 160 of 248
Issue DateTitleAuthor(s)
2018Digital Forensics Model for Mobile VoIP Cloud Computing InvestigationJoshua, Edward Mamza; Ismaila, Idris
2010Design evaluation of some nigerian university portals: A programmers point of viewAbdulhamid, Shafi’i Muhammad; Ismaila, Idris
2016-11-26Data Loss Prevention and Challenges Faced in their DeploymentsVictor, O. Waziri; Ismaila, Idris; John, K. Alhassan; Bolaji, O. Adedayo
2018-01-08Comparative Analysis of Classification Algorithms for Email Spam DetectionShafi’i, Muhammad Abdulhamid; Maryam, Shuaib; Oluwafemi, Osho; Ismaila, Idris; John, K. Alhassan
2020-08Biometry, Encryption and Spyware (BES): A Multi-factor Security and Authentication Mechanism for JAMB E-ExaminationAmadi, Rapheal Sunday; Ismaila, Idris; Hussaini, Abubakar Zubairu; Stella, Oluyemi Etuk; Idris, Mohammed Kolo
2015Big Data Analytics and Data Security in the Cloud via Fully Homomorphic EncryptionVictor, Onomza Waziri; John, K. Alhassan; Ismaila, Idris; Moses, Noel Dogonyaro
2018-07Android malware classification using whale optimization algorithmSulaiman, Salamatu Aliyu; Olawale, Surajudeen Adebayo; Ismaila, Idris; Sulaimon, A. Bashir
2019-03An intelligent crypto-locker ransomware detection technique using support vector machine classification and grey wolf optimization algorithmsIsmaila, Idris; Shafi’i, Muhammad Abdulhamid; Morufu, Olalere; Abdullahi, Muhammad Maigida
2016-11-28An Infallible Technique for Hiding Confidential Data in Compressed Video using LSB and RSA AlgorithmIsmaila, Idris; Onoja, Emmanuel Oche; John, K. Alhassan
2012-02-23An Improved AIS Based E-mail Classification Technique for Spam DetectionIsmaila, Idris; Abdulhamid, Shafi’i Muhammad
2015A Swarm Negative Selection Algorithm for Email Spam DetectionIsmaila, Idris; Ali, Selamat
2015A combined negative selection algorithm–particle swarm optimization for an email spam detection systemIsmaila, Idris; Ali, Selamat; Ngoc, Thanh Nguyen; Sigeru, Omatu; Ondrej, Krejcar; Kamil, Kuca; Marek, Penhaker
2016Online Social Networks: A Survey of Usage and Risks Experience among University Students in North-Central NigeriaYisa, Victor; Oluwafemi, Osho; Soje, Isaac
2018Application of Geo-Location-Based Access Control in an Enterprise EnvironmentYisa, Victor; Baba, Meshach; Oluwafemi, Osho; Sule, Anthony
2016-11-28A Secure Method to Hide Confidential Data Using Cryptography and SteganographyJohn K., Alhassan; Ismaila, Idris; Victor. O, Waziri; Adamu, Abdulkadir
2013A Negative Selection Algorithm Based on Email Classification TechniquesVictor O., Waziri; Ismaila, Idris; Mohammed Bashir, Abdullahi; Hakimi, Danladi; Audu, Isah
2018A Forensic Evidence Recovery from Mobile Device ApplicationsJohn K., Alhassan; Agbejule, Gbolahan; Ismaila, Idris; Mohammed Abdulhamid, Shafii; Victor O., Onomza
2018Security Risk Analysis and Management in Electronic Payment Switching System in Nigeria, eTranzact International Plc. as a Case StudyAdeleke Jimoh, Ilyas; Ojeniyi . A, Joseph; Ismaila, Idris
2019-05Towards a Digital Policing in Developing Nations: The Nigerian Context.Ismaila, Idris; Yisa, Victor; Adeyemi, R. Ikuesan; Apodoghe Imavah, Shaka; Mohammad . B, Abdullahi; Abduldayan, Fatimah; Baba, Meshach
2016-07-04Fault tolerance aware scheduling technique for cloud computing environment using dynamic clustering algorithmAbdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Madni, Syed Hamid Hussain; Abdullahi, Mohammed
Collection's Items (Sorted by Submit Date in Descending order): 141 to 160 of 248