Cyber Security Science : [248] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 161 to 180 of 248
Issue DateTitleAuthor(s)
2016-03-01Resource Scheduling for Infrastructure as a Service (IaaS) in Cloud Computing: Challenges and OpportunitiesMadni, Syed Hamid Hussain; Abdulhamid, Shafi’i Muhammad; Yahaya, Coulibaly; Abdulhamid, Shafi’i Muhammad
2017-08-02Symbiotic Organism Search Optimization Based Task Scheduling in Cloud Computing EnvironmentAbdullahi, Mohammed; Ngadi, Md Asri; Abdulhamid, Shafi’i Muhammad
2017-04-06Optimal Resource Scheduling for IaaS Cloud Computing using Cuckoo Search AlgorithmAbdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Abdul—Salaam, Gaddafi; Madni, Syed Hamid Hussain
2017-03-02Optimal Resource Scheduling for IaaS Cloud Computing using Cuckoo Search AlgorithmMadni, Syed Hamid Hussain; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i Muhammad
2019-06EVALUATION OF MOBILE BANKING SERVICES USAGE IN MINNA, NIGER STATEBaba, Meshach; DOGONYARO, NOEL MOSES; Yisa, Victor L.; OLATUNDE, MAJEEDAH OMOBOLANLE
2014-09Evaluation of Business Continuity and Information Disaster Recovery Mechanism in Top Universities in North CyprusYisa, Victor L.; Baba, Meshach
2017-12-04Distributed Denial of Service Detection using Multi Layered Feed Forward Artificial Neural NetworkIsmaila, Idris; Obi, Blessing Fabian; Abdulhamid, Shafi’i M.; Olalere, Morufu; Baba, Meshach
2018-09PASSWORD KNOWLEDGE VERSUS PASSWORD MANAGEMENTADAMA, VICTOR N.; DOGONYARO, NOEL MOSES; Yisa, Victor L.; Baba, Meshach; AYOBAMI, EKUNDAYO
2012-12THE SIMULATION OF PATH CONTROL AND ROUTE REDISTRIBUTION TECHNIQUES ON THE INTEGRATION OF WANs WITH DIFFERENT ROUTING PROTOCOLSAbdulhamid, S. M.; Yisa, Victor L.; Baba, meshach; Njoku, C.O
2019-05Towards a Digital Policing in Developing Nations: The Nigerian ContextIsmaila, Idris; Yisa, Victor L.; Ikuesan, Adeyemi R.; Imavah, Shaka A.; Mohammad, Abdullahi B.; Abduldayan, Fatimah J; Baba, meshach
2017-06-07Secure e-examination systems compared: Case studies from two countriesFluck, Andrew; Adebayo, Olawale S.; Abdulhamid, Shafi’i Muhammad
2017-06-04A Review on Mobile SMS Spam Filtering TechniquesAbdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Chiroma, Haruna; Osho, Oluwafemi; Abdul-Salaam, Gaddafi; Abubakar, Adamu I.; Herawan, Tutut
2017-07-12Performance Comparison of Heuristic Algorithms for Task Scheduling in IaaS Cloud Computing EnvironmentMadni, Syed Hamid Hussain; Abd Latiff, Muhammad Shafie; Mohammed, Abdullahi; Ngadi, M. A.; Abdulhamid, Shafi’i Muhammad
2018-05-01Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature TechniquesOjeniyi, Joseph A.; Adedayo, Bolaji O.; Ismaila, Idris; Abdulhamid, Shafi’i Muhammad
2018-05-12A Cloud-based Conceptual Framework for Multi-Objective Virtual Machine Scheduling using Whale Optimization AlgorithmRana, Nadim; Abd Latiff, Shafie Muhammad; Abdulhamid, Shafi’i Muhammad
2011Weather flow patterns visualization using data minning technique with emphasis on rain fall. . Vol. 1(1) paOlagunju, M.; Taiwo, Adebayo Omotayo; Ameen, A. O.; Mabayoje, Modina A.; Adebayo, Olawale Surajudeen
2018-07-02Security Risk Analysis and Management in mobile wallet transaction: A Case study of Pagatech Nigeria LimitedAbdulrahaman, Musbau D.; Alhassan, John K.; Ojeniyi, Joseph A.; Abdulhamid, Shafi’i Muhammad
2018-08-02Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing EnvironmentAbdulhamid, Shafi’i Muhammad; Sadiq, Nafisat Abubakar; Abdullahi, Mohammed; Rana, Nadim; Chiroma, Haruna; Gbenga, Dada Emmanuel
2018-10-06An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian ClassifierChristopher, Haruna Atabo; Yakubu, Jimoh; Abdulhamid, Shafi’i Muhammad; Mohammed, Abdulmalik D
2018-02-10An Intelligent Crypto-locker Ransomware Detection Technique using Support Vector Machine Classification and Greywolf Optimization AlgorithmMaigida, Abdullahi Mohammed; Abdulhamid, Shafi’i Muhammad; Morufu, Olalere
Collection's Items (Sorted by Submit Date in Descending order): 161 to 180 of 248