Collection's Items (Sorted by Submit Date in Descending order): 201 to 220 of 248
Issue Date | Title | Author(s) |
2015 | Big data analytics and data security in the cloud via fully homomorphic encryption | Waziri, V.O; Alhassan, J.K; Ismaila, I.; Noel, M.D |
2018 | PASSWORD KNOWLEDGE VERSUS PASSWORD MANAGEMENT | Adama, V.N; Noel, M.D; Yisa, V.L; Meshach, B.; Ayobami, E. |
2020 | DEVELOPMENT OF A FRAMEWORK FOR AIR REMARK APPLICATION: A CASE OF NIGERIAN AVIATION INDUSTRY | Etuk, S.O; Sani, Y.M; Sunday, O.G; Noel, M.D |
2019 | DEVELOPMENT OF CRYPTO-BIOMETRIC SYSTEM USING FINGERPRINT AND RSA MODEL FOR SECURE COMMUNICATION | Noel, M.D; Waziri, O.V; Sheidu, K.J |
2011 | AUTOMATIC OFFLINE SIGNATURE VERIFICATION SYSTEM | Olalere, Morufu |
2011 | Security Application in Bluetooth Technology | Olalere, Morufu; Ismaila, Idris |
2011 | Partnering entrepreneurship and information technology (IT) for a better world | Sakariyau, O. B.; Umar, Z.; Dauda, C. K.; Paiko, I. I.; Olalere, Maruf |
2014 | Cyber Security Education: A Tool for National Security | Olalere, Morufu; Waziri, Dr. Victor O; Ismaila, Idris; Adebayo, Olawale S.; Ugwu, Joel N. |
2014 | Active Defence: An Evolving Gaming Strategy for Attacker Defender in a Network Environment | Waziri, Victor Onomza; Anuonye, Stanley Obinna; Olalere, Morufu; Ismaila, Idris |
2014 | e-fraud Forensics Investigation Techniques with Formal Concept Analysis | Waziri, Victor Onomza; Umar, Abdullahi; Olalere, Morufu |
2014 | Assessment of Information Security Awareness among Online Banking Costumers in Nigeria | Olalere, Morufu; Waziri, Victor O.; Ismaila, Idris; Adebayo, Olawale S.; Olalode, O. |
2014 | N-Cryptographic Multilevel Algorithm for Effective Information Security | Adebayo, Olawale S.; Olalere, Morufu; Mishra, Amit; Mabayoje, M. A.; Ugwu, Joel N. |
2014 | Big Data Analytics and the Epitome of fully Homomorphic Encryption Scheme for Cloud Computing Security | Waziri, Victor O.; Alhassan, John K.; Olalere, Morufu; Ismaila, Idris |
2015 | A Survey of Cloud Computing Awareness, Security Implication and Adoption in Nigeria IT Based | Bashir, Sulaimon A.; Adebayo, Olawale Surajudeen; Abdulsalam, Sulaimon O.; Sadiku, J. S.; Mabayoje, Modina A. |
2020 | Systematic Review of Facia Recognition Algorithms and Approaches for Crime Investigations | Ganiyu, Shefiu O.; Olaniyi, Mikail O.; Adebayo, Olawale Surajudeen; Akpagher, Terfa Daniel |
2018 | Security Risk Analysis and Management in GSM Operations Using MTN as a Case Study | Ndatsu, Zainab; Adebayo, Olawale Surajudeen; Ojeniyi, Joseph Adebayo |
2019 | Phishing Attack Detection Based on Random Forest with Wrapper Feature Selection Method | Abdulrahman, Musbau Dogo; Alhassan, John K; Adebayo, Olawale Surajudeen; Ojeniyi, Joseph Adebayo; Olalere, Morufu |
2020 | Improved Genetically Optimized Neural Network Algorithm for the Classification of Distributed Denial of Service Attack | Gadzama, Emmanuel H; Adebayo, Olawale Surajudeen |
2013 | The Prospects for e-Examinations in Nigeria and Australia | Adebayo, Olawale Surajudeen; Abdulhamid, Shafi’i Muhammad; Fluck, Andrew |
2012 | Cyber Crimes Analysis Based on Open Source Digital Forensic Tools | Waziri, Victor O.; Okongwu, N. O; Isah, Audu; Adebayo, Olawale Surajudeen; Abdulhamid, Shafi’í M. |
Collection's Items (Sorted by Submit Date in Descending order): 201 to 220 of 248