Cyber Security Science : [248] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 248
Issue DateTitleAuthor(s)
2018Security Risk Analysis and Management in Online Retailing Transactions, using Konga as a case studyEdward, J. M.; Idris, I; Ojeniyi, Joseph Adebayo; Abdulhamid, S. M.
2017HTTP Flood Mitigation Using Gateway Inspection and Second Chance Approach AnalysisIdris, I; Tobi, O. J.; Waziri, V. O.; Alhassan, J. K.; Ojeniyi, Joseph Adebayo
2018A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection AttackOlalere, M; Egigogo, R. A.; Ojeniyi, Joseph Adebayo; Idris, I; Jimoh, R. G.
2819Security Risk Analysis in Online Banking Transactions: Using Diamond Bank as a Case StudyOjeniyi, Joseph Adebayo; Edward, E.O.; Abdulhmid, S. M.
2018Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature TechniquesOjeniyi, Joseph Adebayo; Adedayo, B. O.; Ismaila, I; Shafii, A. M.
2015Organizational Attendance Record System: Fraud and A Proposed Facial Recognition TechniqueOlalere, M; Ojeniyi, Joseph Adebayo; Osho, F; Ugwu, J.N.
2013Network Security in Cloud Computing with Elliptic Curve CryptographyWaziri, V. O.; Ojeniyi, Joseph Adebayo; Hakimi, D; Audu, I; Abubakar, S.M.; Abdullahi, M. B.
2012information security on the communication network in Nigeria based on digital SignatureAdebayo, OS; Waziri, VO; Ojeniyi, Joseph Adebayo; Bashir, SA; Mishra, A
2013Network Security in Cloud Computing with Elliptic Curve CryptographyWaziri, V. O.; Ojeniyi, Joseph + "Adebayo"
2021-08-31COVID-19 ANDROID-BASED TEXT-TO-SPEECH APPLICATION: AN INCLUSION OF PEOPLE LIVING WITH READING AND SIGHTING DISABILITIESYAHAYA, M.S; EMMANUEL, I.O; NOEL, M.D; BENJAMIN, P.D
2021-09-03Review and analysis of classical algorithms and hash-based post-quantum algorithmNoel, Moses Dogonyaro; Waziri, Onomza Victor; Abdulhamid, Muhammad Shafii; Ojeniyi, Adebayo Joseph
2021-09Secured E-Commerce System using ECC and Multimodal BiometricsOnuja, Abdulkareem; Oyefolahan, Ishaq Oyebisi; Adebayo, Olawale Surajudeen; Isah, Abdulkadir O; Olaniyi, Mika'il Olayemi
2021-02Convolutional neural network-based approach for dermatological disease predictionAdeyemo, Afiz Adeniyi; Bashir, Sulaimon Adebayo; Adebayo, Olawale Surajudeen; Ganiyu, Shefiu Olusegun
2021-08Comparative Analysis of Machine Learning Algorithms for the Detection of Android MalwareEfefiong, Udo-Nya; Adebayo, Olawale Surajudeen
2022-04Development of An Electronic Secure Students’ Works Experience Scheme Placement SystemAdebayo, Olawale Surajudeen; Bashir, Sulaimon Adebayo; Abdullah, Monday Jubril; Omale, Samuel Enemona; Abdulazeez, Lateefah
2022-02Development of Secure Electronic Cybercrime Cases Database System for the JudiciaryAdebayo, Olawale Surajudeen; Joshua, Bulus Micah; Ganiyu, Shefiu Olusegun; Alabi, Isiaq Oludare; Abdulazeez, Lateefah
2022-06Data Privacy System Using Steganography and CryptographyAdebayo, Olawale Surajudeen; Ganiyu, Shefiu Olusegun; Osang, Fransic Bukie; Salawu, Sule Ajiboye; Mustapha, Kazim; Abdulazeez, Lateefah
2012-02-16Effect of network hierarchy in a typical campus area network (CAN) of a universityZubair, Suleiman; Adediran, Y. A.; Misra, Sanjay; AbdulAzeez, Hassan T.; Suleiman, Ahmad
2011-08-10Design and construction of a microcontroller based single axis solar trackerZubair, Suleiman; Suleiman, Ahmad; AbdulAzeez, Hassan T
2013-04-15Design and Construction of a Simple Microcontroller Based Conference Electronic Voting Machine with Digital DisplaySuleiman, Ahmad; Zubair, Suleiman.; AbdulAzeez, Hassan T.; Salihu, Bala .A; Salihu, Y
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 248