Cyber Security Science : [248] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 248
Issue DateTitleAuthor(s)
2013Design and Construction of a Simple Microcontroller Based Conference Electronic Voting Machine with Digital DisplaAhmad, Suleiman; Zubair, Suleiman; Abdulazeez, Hassan T.; Salihu, B. A.; Salihu, Y.
2012-02-02Investigating the Potential of Wind as a Recovery Improvement of Building Integrated Photovoltaic’s Tiled Roof Using Indoor Solar SimulatorMambo, Abdulhamid. D; Zubair, Suleiman.; Abdulazeez, Hassan. T; Ahmad, Suleiman
2012-02-16Effect of network hierarchy in a typical campus area network (CAN) of a universityZubair, Suleiman; Adediran, Y. A.; Misra, Sanjay.; Salihu, B. A.; Abdulazeez, Hassan. T.; Ahmad, Suleiman
2011Privacy and National Security Issues in Social Networks: The ChallengesAbdulhamid, Shafi'i Muhammad; Ahmad, Suleiman; Waziri, Victor Onomza; Jibril, Fatima N.
2011-08-10Design and construction of a microcontroller based single axis solar trackerZubair, Suleiman; Ahmad, Suleiman; Abdulazeez, Hassan T.; Salihu, B. A.
2023-12-01A Comparative Experimental Evaluation of Antimalware Tools on Android Mobile DeviceS. O Subairu, S. A. Gbadamosi
2023Modeling DDOS attacks in sdn and detection using random forest classifierAbdullahi Wabi, Aishatu; Idris, Ismaila; Olaniyi, Olayemi Mikail; Ojeniyi, Joseph Adebayo; Adebayo, Olawale Surajudeen
2023Blockchain Based Zero Knowledge Proof Model for Secure Data Sharing Scheme in a Distributed Vehicular NetworksMohammad, Umar Majigi; Ismaila, Idris; Shafii, M. Abdulhamid; Richard, Adeyemi Ikuesan
2023-05Application of Machine Learning Algorithm for Classification of Fake COVID-19 TweetsMalomo, O. S.; Uduimoh, A. A.; Alhassan, J.K.
2023-05-11Design Framework of Cyber Security Solutions to Threats and Attacks on Critical Infrastructure of Electricity Power Systems of Nigeria CompaniesIsmaila, Idris; Ilyas, Adeleke; Andrew, Anogie Uduimoh; Joshua, J. Tom
2019-06-11Forensic Analysis of Mobile Banking Applications in NigeriaUduimoh, A. A.; Ismaila, I.; Osho, O; Abdulhamid, S.M
2023Design Framework of Cyber Security Solutions to Threats and Attacks on Critical Infrastructure of Electricity Power Systems of Nigeria Companies.Ismaila, Idris; ilyas, Adeleke; Andrew, Anogie Uduimoh; Joshua, j. Tom
2023-04-04Systematic Literature Review and Metadata Analysis of Insider Threat Detection MechanismIsmaila, Idris; Adeleke, Nafisa Damilola
2023-03-14Impact Analysis and Features for DDOS Attacks Detection in SDNAbdullahi, Aishatu Wabi; Ismaila, Idris; Olayemi, Mikail Olaniyi; Joseph, A. Ojeniyi
2014Assessment of Information Security Awareness among Online Banking Costumers in NigeriaOlalere, Morufu; Waziri, Onomza Victor; Ismaila, Idris; Adebayo, Olawale Surajudeen; Ololade, O
2020-09-10Improved Genetically Optimized Neural Network Algorithm for the Classification of Distributed Denial of Service AttackGadzama, Emmanuel Hamman; Adebayo, Olawale Surajudeen
2021-08-20Convolutional neural network-based approach for dermatological disease predictionAfiz, Adeniyi; Bashir, Sulaimon Adebayo; Adebayo, Olawale Surajudeen; Ganiyu, Shefiu Olusegun
2022-10-20Intelligent Criminal Identification System For Semi-Regulated EnvironmentsGaniyu, Shefiu Olusegun; Akpagher, T. D.; Olaniyi, Mikail Olayemi; Adebayo, Olawale Surajudeen
2022Review and analysis of classical algorithms and hash-based post-quantum algorithmNoel, M. D.; Waziri, V.O.; Abdulhmid, S. M.; Ojeniyi, Joseph Adebayo
2018Security Risk Analysis and Management in mobile wallet transaction: A Case study of Pagatech Nigeria LimitedAbdulrahamn, M. D.; Alhassan, J. K.; Ojeniyi, Joseph Adebayo; Abdulhamid, S. M.
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 248