Cyber Security Science : [248] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 181 to 200 of 248
Issue DateTitleAuthor(s)
2018-03-06A Soft Computing Approach to Detecting E-Banking Phishing Websites using Artificial Neural Network with Confusion MatrixAbdulhamid, Shafi’i Muhammad; Usman, Mubaraq Olamide; Ojerinde, Oluwaseun A.; Victor Ndako, Adama; Alhassan, John K
2018-04-03Progress on Artificial Neural Networksfor Big Data Analytics: A SurveyChiroma, Haruna; Abdullahi, Usman Ali; Abdulhamid, Shafi’i Muhammad
2019-07-20Security Risk Analysis and Management in Banking Sector: A Case Study of a Selected Commercial Bank in NigeriaGana, Noah N.; Abdulhamid, Shafi’i Muhammad; Ojeniyi, Joseph A.
2019-01-13Security Risk Analysis in Online Banking Transactions: Using Diamond Bank as a Case StudyJoseph, Ojeniyi; Edward, Elizabeth O.; Abdulhamid, Shafi’i Muhammad
2019-05-13A survey of symbiotic organisms search algorithms and applicationsAbdullahi, Mohammed; Ngadi, Md Asri; Dishing, Salihu Idi; Abdulhamid, Shafi’i Muhammad; Joda, Usman
2015-11E-Voting in Nigeria: A Survey of Voters' Perception of Security and Other Trust FactorsOluwafemi, Osho; Yisa, Victor; Olawale, Joshua Jebutu
2014-09Evaluation of Business continuity and Information Disaster Recovery Mechanism in Top Universities of North CyprusYisa, Victor
2019-02-14An efficient symbiotic organisms search algorithm with chaotic optimization strategy for multi-objective task scheduling problems in cloud computing environmentAbdullahi, Mohammed; Ngadi, Md Asri; Dishing, Salihu Idi; Abdulhamid, Shafi’i Muhammad
2019-07-20Whale Optimization Algorithm: A Systematic Review of Contemporary Applications, Modifications and DevelopmentsRana, Nadim; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i M.; Chiroma, Haruna
2019-05-12Security Challenges in Fog Computing Environment: A Systematic Appraisal of Current DevelopmentsYakubu, Jimoh; Abdulhamid, Shafi’i Muhammad; Christopher, Haruna Atabo; Chiroma, Haruna; Abdullahi, Mohammed
2019-03-13Systematic Literature Review and Metadata Analysis of Ransomware Attacks and Detection MechanismsMaigida, Abdullahi Mohammed; Abdulhamid, Shafi’i Muhammad; Olalere, Morufu; Alhassan, John K.; Chiroma, Haruna; Gbenga, Dada Emmanuel
2019-04-02Whale Optimization Algorithm-based Email Spam Feature Selection Method using Rotation Forest Algorithm for ClassificationShuaib, Maryam; Abdulhamid, Shafi’i Muhammad; Adebayo, Olawale Surajudeen; Osho, Oluwafemi; Idris, Ismaila; Alhassan, John K; Rana, Nadim
2019-04-20Machine Learning for Email Spam Filtering: Review, Approaches, and Open Research ProblemsEmmanuel, Dada; Adetunmbi, Adebayo; Chiroma, Haruna; Abdulhamid, Shafi’i Muhammad; Joseph, Stephen; Opeyemi, Ajibuwa
2020-05-20Deep Learning Architectures in Emerging Cloud Computing Architectures: Recent Development, Challenges and Next Research TrendFatsuma, Jauro; Chiroma, Haruna; Gital, Abdulsalam Y.; Almutairi, Mubarak; Abdulhamid, Shafi’i Muhammad; Abawajy, Jemal H.
2020-05-12Detecting Ransomware Attacks Via Intelligent Algorithms: Recent Development and Next Direction from Deep Learning and Big Data PerspectivesIbrahim, Bello; Chiroma, Haruna; Abdullahi, Usman A.; Yau, Abdulsalam Gital; Jauro, Fatsuma; Khan, Abdullah; Okesola, Julius O.; Abdulhamid, Shafi’i Muhammad
2020-05-12Whale Optimization Algorithm: A Systematic Review of Contemporary Applications, Modifications and DevelopmentsRana, Nadim; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i M.; Chiroma, Haruna
2020-06-20Machine Learning Algorithms for Improving Security on Touch Screen Devices: A Survey, Challenges and New PerspectivesBello, Auwal Ahmed; Chiroma, Haruna; Gital, Abdulsalam Y.; Gabralla, Lubna A.; Abdulhamid, Shafi’i Muhammad; Shuib, Liyana
2012The Challenges of Missing Results of e-Examination in Nigerian UniversitiesShitu, Kelani Okunade; Adebayo, Olawale Surajudeen; Yisa, Victor L; baba, meshach
2018-01Application of Geo-Location-Based Access Control in an Enterprise EnvironmentYisa, L. Victor; Baba, meshach; Osho, Oluwafemi; Sule, Anthony
2010Application of Information Technology and its ChallengesMishra, Amit; Adebayo, Olawale Surajudeen; Abdullah, S. Y.; Mabayoje, Modina A.
Collection's Items (Sorted by Submit Date in Descending order): 181 to 200 of 248