Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 248
Issue Date | Title | Author(s) |
2016 | Layered and hierarchical approach for modelling multidimensional design threats | Ojeniyi, Joseph Adebayo; Waziri, Victor Onomza; Aibinu, Abiodun Musa; Inyiama, H. C. |
2016 | Improving Digital Forensics Analysis in Federated Domains through Estimator Analysis and Network Flow Optimization | Ojeniyi, Joseph Adebayo; Longe, O. B.; Oguntade, E. S. |
2016 | Enhanced Security Testbed Threat Model Based on Parametric Equation and Multi-Level Design Approach | Ojeniyi, Joseph Adebayo; Waziri, Victor Onomza; Aibinu, Abiodun Musa; Inyiama, H. C. |
2025 | Development of a hybridized CNN-BiGRU Framework for detection of website phishing attacks | Egigogo, A. R.; Ismaila, Idris; Olalere, Morufu; Abisoye, O. A.; Ojeniyi, Joseph Adebayo |
2025 | An advanced feature engineering approach for sybil attack detection in fog computing environment | Shuaib, Maryam; Abdulhamid, Shafii Muhammed; Ojeniyi, Joseph Adebayo; Dauda, U. S.; Ismaila, Idris; Noel, Moses Dogonyaro |
2024 | DDOS attack detection in SDN: Method of attacks, detection techniques, challenges and research gaps | Abdullahi, Aishatu Wabi; Ismaila, Idris; Olaniyi, O. M.; Ojeniyi, Joseph Adebayo |
2023 | DDoS attack detection against SDN controller using a single traffic feature | Abdullahi, A. W.; Ismaila, Idris; Olaniyi, O. M.; Ojeniyi, Joseph Adebayo; Adebayo, O. S.; Uduimoh, A. A. |
2018 | Security risk assessment in pension fund administration using ARM as a case study | Samuel, O; Ojeniyi, Joseph Adebayo; Abdulhamid, Shafii Muhammed |
2014 | Granger Causality Test: A Useful Descriptive Tool for Time Series Data | Oguntade, Emmanuel; Olanrewaju, S; Ojeniyi, Joseph Adebayo |
2024-06-30 | Development of an Improved Winternitz Hash-based Signature Algorithm for Blockchain Cryptocurrency Transaction Security. | Dogonyaro, Noel, M.; Ahmad, S.; Isah, A. O.; Subairu, S. O. |
2024-07-27 | Secure Communication in Wireless Body Area Networks with ECC-Based Key Management and Renewal Protocols | Yusuf, T.; Waziri, V.O; Olalere, M; Noel, M.D |
2024-06-30 | DEVELOPMENT OF AN IMPROVED WINTERNITZ HASH-BASED SIGNATURE ALGORITHM FOR BLOCKCHAIN CRYPTOCURRENCY TRANSACTION SECURITY | Noel, M.D; Ahmad, S; Isah, A.O; Subairu, S.O |
2024 | Designing an email header analysis tool for cyber threat intelligence. | AbdulAzeez, Hassan T.; Ahmad, Suleiman.; Raji, A; Maliki, D |
2012 | CRYPTOGRAPHIC MODELING IN SERVICE LEVEL AGREEMENT | Ahmad, Suleiman |
2011-09-07 | Analyzing Membership Profile Privacy Issues in Online Social Networks | Abdulhamid, Shafi’i Muhammad; Abdulazeez, Hassan T.; Abrahamand, Ochoche; Mohammed, Umar |
2010-11-06 | OPNET IT GURU for Networking Education Nigeria Universities | Zubair, Suleiman; Ahmad, S; Abdulazeez, H. T; Salihu, Bala A. |
2010-11-08 | Design of a Trapdoor for Password Access | Ahmad, Suleiman; Zubair, Suleiman.; Abdulazeez, Hassan. T; Salihu, Bala A.; Idris, L.; Ibrahim, A. |
2012-06 | CRYPTOGRAPHIC MODELING IN SERVICE LEVEL AGREEMENT | Ahmad, Suleiman |
2024-02-08 | Enhancing Fast Fourier Transform Algorithm for Keystroke Acoustic Emanation Denoising Strategy on Real-Time Scenario | Ahmad, Suleiman; Alhassan, John Kolo; Abdulhamid, Shafi'i Muhammad; Zubair, Suleiman |
2022-12 | An Internet of Things (IoT)-based Veterinary Support System for Livestock Skin Disease Health Care using MobileNetV2 | Maliki, Danlami; Ibrahin, Aliyu; Jinsul, Kim; Emmanuel, Fiyinfoluwa Ogunbase; Ahmad, Suleiman; Ibrahim, Mohammed Abdullahi |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 248