Collection's Items (Sorted by Submit Date in Descending order): 181 to 200 of 248
Issue Date | Title | Author(s) |
2018-03-06 | A Soft Computing Approach to Detecting E-Banking Phishing Websites using Artificial Neural Network with Confusion Matrix | Abdulhamid, Shafi’i Muhammad; Usman, Mubaraq Olamide; Ojerinde, Oluwaseun A.; Victor Ndako, Adama; Alhassan, John K |
2018-04-03 | Progress on Artificial Neural Networksfor Big Data Analytics: A Survey | Chiroma, Haruna; Abdullahi, Usman Ali; Abdulhamid, Shafi’i Muhammad |
2019-07-20 | Security Risk Analysis and Management in Banking Sector: A Case Study of a Selected Commercial Bank in Nigeria | Gana, Noah N.; Abdulhamid, Shafi’i Muhammad; Ojeniyi, Joseph A. |
2019-01-13 | Security Risk Analysis in Online Banking Transactions: Using Diamond Bank as a Case Study | Joseph, Ojeniyi; Edward, Elizabeth O.; Abdulhamid, Shafi’i Muhammad |
2019-05-13 | A survey of symbiotic organisms search algorithms and applications | Abdullahi, Mohammed; Ngadi, Md Asri; Dishing, Salihu Idi; Abdulhamid, Shafi’i Muhammad; Joda, Usman |
2015-11 | E-Voting in Nigeria: A Survey of Voters' Perception of Security and Other Trust Factors | Oluwafemi, Osho; Yisa, Victor; Olawale, Joshua Jebutu |
2014-09 | Evaluation of Business continuity and Information Disaster Recovery Mechanism in Top Universities of North Cyprus | Yisa, Victor |
2019-02-14 | An efficient symbiotic organisms search algorithm with chaotic optimization strategy for multi-objective task scheduling problems in cloud computing environment | Abdullahi, Mohammed; Ngadi, Md Asri; Dishing, Salihu Idi; Abdulhamid, Shafi’i Muhammad |
2019-07-20 | Whale Optimization Algorithm: A Systematic Review of Contemporary Applications, Modifications and Developments | Rana, Nadim; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i M.; Chiroma, Haruna |
2019-05-12 | Security Challenges in Fog Computing Environment: A Systematic Appraisal of Current Developments | Yakubu, Jimoh; Abdulhamid, Shafi’i Muhammad; Christopher, Haruna Atabo; Chiroma, Haruna; Abdullahi, Mohammed |
2019-03-13 | Systematic Literature Review and Metadata Analysis of Ransomware Attacks and Detection Mechanisms | Maigida, Abdullahi Mohammed; Abdulhamid, Shafi’i Muhammad; Olalere, Morufu; Alhassan, John K.; Chiroma, Haruna; Gbenga, Dada Emmanuel |
2019-04-02 | Whale Optimization Algorithm-based Email Spam Feature Selection Method using Rotation Forest Algorithm for Classification | Shuaib, Maryam; Abdulhamid, Shafi’i Muhammad; Adebayo, Olawale Surajudeen; Osho, Oluwafemi; Idris, Ismaila; Alhassan, John K; Rana, Nadim |
2019-04-20 | Machine Learning for Email Spam Filtering: Review, Approaches, and Open Research Problems | Emmanuel, Dada; Adetunmbi, Adebayo; Chiroma, Haruna; Abdulhamid, Shafi’i Muhammad; Joseph, Stephen; Opeyemi, Ajibuwa |
2020-05-20 | Deep Learning Architectures in Emerging Cloud Computing Architectures: Recent Development, Challenges and Next Research Trend | Fatsuma, Jauro; Chiroma, Haruna; Gital, Abdulsalam Y.; Almutairi, Mubarak; Abdulhamid, Shafi’i Muhammad; Abawajy, Jemal H. |
2020-05-12 | Detecting Ransomware Attacks Via Intelligent Algorithms: Recent Development and Next Direction from Deep Learning and Big Data Perspectives | Ibrahim, Bello; Chiroma, Haruna; Abdullahi, Usman A.; Yau, Abdulsalam Gital; Jauro, Fatsuma; Khan, Abdullah; Okesola, Julius O.; Abdulhamid, Shafi’i Muhammad |
2020-05-12 | Whale Optimization Algorithm: A Systematic Review of Contemporary Applications, Modifications and Developments | Rana, Nadim; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i M.; Chiroma, Haruna |
2020-06-20 | Machine Learning Algorithms for Improving Security on Touch Screen Devices: A Survey, Challenges and New Perspectives | Bello, Auwal Ahmed; Chiroma, Haruna; Gital, Abdulsalam Y.; Gabralla, Lubna A.; Abdulhamid, Shafi’i Muhammad; Shuib, Liyana |
2012 | The Challenges of Missing Results of e-Examination in Nigerian Universities | Shitu, Kelani Okunade; Adebayo, Olawale Surajudeen; Yisa, Victor L; baba, meshach |
2018-01 | Application of Geo-Location-Based Access Control in an Enterprise Environment | Yisa, L. Victor; Baba, meshach; Osho, Oluwafemi; Sule, Anthony |
2010 | Application of Information Technology and its Challenges | Mishra, Amit; Adebayo, Olawale Surajudeen; Abdullah, S. Y.; Mabayoje, Modina A. |
Collection's Items (Sorted by Submit Date in Descending order): 181 to 200 of 248