Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 248
Issue Date | Title | Author(s) |
2014-09-06 | Scheduling Techniques in on-Demand Grid as a Service Cloud: A Review | Abdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Bashir, Mohammed Bakri |
2015-03-04 | A Survey of League Championship Algorithm: Prospects and Challenges | Abdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Madni, Syed Hamid Hussain; Osho, Oluwafemi |
2016-09-20 | A Support Vector Machine Classification of Computational Capabilities of 3D Map on Mobile Device for Navigation Aid. | Mantoro, Abubakar; Moedjiono, S; Chiroma, Haruna; Waqas, A; Abdulhamid, Shafi’i Muhammad; Hamza, M. F.; Gital, A |
2016-09-10 | An Appraisal of Meta-Heuristic Resource Allocation Techniques for IaaS Cloud | Madni, Syed Hamid Hussain; Abd Latiff, Shafi’i Muhammad; Coulibaly, Yahaya; Abdulhamid, Shafi’i Muhammad |
2016-02-13 | Recent Advancements in Resource Allocation Techniques for Cloud | Madni, Syed Hamid Hussain; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i Muhammad |
2011 | e-exams learning system for Nigerian universities with emphasis on security and result integrity. Volume 18(2) | Adebayo, Olawale Surajudeen; AbdulHamid, Shafi’i Muhammad |
2014-02-12 | Evolutionary Modified Detector Generation Model in Negative Selection Algorithm for Email Spam Detection | Ismaila, Idris; Selamat, Ali |
2013 | Email Spam Detection Using Differential Evolution Negative Selection Algorithm | Ismaila, Idris; Selamat, A. |
2019-06-30 | Smart Financial Fraud Detection and Customer risk Profilling in Finalcial Institutions to Identify Potential Criminals using Genetic Markov Algorithm | Idris, Muhammad S.; Ismaila, Idris |
2014 | Hybrid email spam detection model with negative selection algorithm and differential evolution | Ismaila, Idris; Selamat, Ali; Sigeru, Omatu |
2014 | Improved email spam detection model with negative selection algorithm and particle swarm optimization | Ismaila, Idris; Selamat, A. |
2018 | Evaluation of Mobile Banking Services Usage in Minna, Niger State | baba, meshach; yisa, victor; dogonyaro, noel moses; Olatunde, Majeedah Bolanle |
2014-04 | Email Spam Detection Generation Algorithm for Negative Selection Algorithm with Hamming Distance Partial Matching Rules | Ismaila, Idris; Shafi‘i, Muhammad Abdulhamid; Abdulmalik, Mohammed; Umar, Dauda Suleiman; Nicholas, Akosu |
2012 | Optimized Spam Classification Approach with Negative Selection Algorithm | Ismaila, Idris; Ali, Selamat |
2020-09 | A Comparative Experimental Evaluation of the Detection Rates and Removal Abilities of Fifteen Malware Detector Tools on Xpaj.MBR Rootkit | Subairu, S.O; Alhassan, J.K; Nwaocha, V.O; Saidu, I.R |
2020 | Empirical Design Framework for Development of Convolutional Neural Network Based Model | Subairu, S.O; Alhassan, J.K; Abdulhamid, S.M; Ojeniyi, J.A |
2020 | Formulation of Quick Response Code Dataset for Machine learning Analysis | Subairu, S. O; Alhassan, J.K; Abdulhamid, S.M; Ojeniyi, J.A |
2020 | An Experimental Approach to Unravel Effects of Malware on System Network Interface | Subairu, Sikiru Olanrewaju; Alhassan, J.K; Sanjay, Misra; Abayomi-Alli, Olusola; Ahuja, Ravin; Damasevicius, Robertas; Maskeliunas, Rytis |
2017 | Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on Transition. International Journal of Cyber-Security and Digital Forensics | Isah, A.O; Alhassan, JK; Olanrewaju, Sikiru Subairu; Enesi, Femi Aminu |
2017-06-29 | Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit | Subairu, S.O; Alhassan, JK; Isah, A.O |
Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 248