Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 248
Issue Date | Title | Author(s) |
2018 | Security Risk Analysis and Management in Online Retailing Transactions, using Konga as a case study | Edward, J. M.; Idris, I; Ojeniyi, Joseph Adebayo; Abdulhamid, S. M. |
2017 | HTTP Flood Mitigation Using Gateway Inspection and Second Chance Approach Analysis | Idris, I; Tobi, O. J.; Waziri, V. O.; Alhassan, J. K.; Ojeniyi, Joseph Adebayo |
2018 | A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection Attack | Olalere, M; Egigogo, R. A.; Ojeniyi, Joseph Adebayo; Idris, I; Jimoh, R. G. |
2819 | Security Risk Analysis in Online Banking Transactions: Using Diamond Bank as a Case Study | Ojeniyi, Joseph Adebayo; Edward, E.O.; Abdulhmid, S. M. |
2018 | Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniques | Ojeniyi, Joseph Adebayo; Adedayo, B. O.; Ismaila, I; Shafii, A. M. |
2015 | Organizational Attendance Record System: Fraud and A Proposed Facial Recognition Technique | Olalere, M; Ojeniyi, Joseph Adebayo; Osho, F; Ugwu, J.N. |
2013 | Network Security in Cloud Computing with Elliptic Curve Cryptography | Waziri, V. O.; Ojeniyi, Joseph Adebayo; Hakimi, D; Audu, I; Abubakar, S.M.; Abdullahi, M. B. |
2012 | information security on the communication network in Nigeria based on digital Signature | Adebayo, OS; Waziri, VO; Ojeniyi, Joseph Adebayo; Bashir, SA; Mishra, A |
2013 | Network Security in Cloud Computing with Elliptic Curve Cryptography | Waziri, V. O.; Ojeniyi, Joseph + "Adebayo" |
2021-08-31 | COVID-19 ANDROID-BASED TEXT-TO-SPEECH APPLICATION: AN INCLUSION OF PEOPLE LIVING WITH READING AND SIGHTING DISABILITIES | YAHAYA, M.S; EMMANUEL, I.O; NOEL, M.D; BENJAMIN, P.D |
2021-09-03 | Review and analysis of classical algorithms and hash-based post-quantum algorithm | Noel, Moses Dogonyaro; Waziri, Onomza Victor; Abdulhamid, Muhammad Shafii; Ojeniyi, Adebayo Joseph |
2021-09 | Secured E-Commerce System using ECC and Multimodal Biometrics | Onuja, Abdulkareem; Oyefolahan, Ishaq Oyebisi; Adebayo, Olawale Surajudeen; Isah, Abdulkadir O; Olaniyi, Mika'il Olayemi |
2021-02 | Convolutional neural network-based approach for dermatological disease prediction | Adeyemo, Afiz Adeniyi; Bashir, Sulaimon Adebayo; Adebayo, Olawale Surajudeen; Ganiyu, Shefiu Olusegun |
2021-08 | Comparative Analysis of Machine Learning Algorithms for the Detection of Android Malware | Efefiong, Udo-Nya; Adebayo, Olawale Surajudeen |
2022-04 | Development of An Electronic Secure Students’ Works Experience Scheme Placement System | Adebayo, Olawale Surajudeen; Bashir, Sulaimon Adebayo; Abdullah, Monday Jubril; Omale, Samuel Enemona; Abdulazeez, Lateefah |
2022-02 | Development of Secure Electronic Cybercrime Cases Database System for the Judiciary | Adebayo, Olawale Surajudeen; Joshua, Bulus Micah; Ganiyu, Shefiu Olusegun; Alabi, Isiaq Oludare; Abdulazeez, Lateefah |
2022-06 | Data Privacy System Using Steganography and Cryptography | Adebayo, Olawale Surajudeen; Ganiyu, Shefiu Olusegun; Osang, Fransic Bukie; Salawu, Sule Ajiboye; Mustapha, Kazim; Abdulazeez, Lateefah |
2012-02-16 | Effect of network hierarchy in a typical campus area network (CAN) of a university | Zubair, Suleiman; Adediran, Y. A.; Misra, Sanjay; AbdulAzeez, Hassan T.; Suleiman, Ahmad |
2011-08-10 | Design and construction of a microcontroller based single axis solar tracker | Zubair, Suleiman; Suleiman, Ahmad; AbdulAzeez, Hassan T |
2013-04-15 | Design and Construction of a Simple Microcontroller Based Conference Electronic Voting Machine with Digital Display | Suleiman, Ahmad; Zubair, Suleiman.; AbdulAzeez, Hassan T.; Salihu, Bala .A; Salihu, Y |
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 248