Browsing by Author Alhassan, J.K

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 12 of 12
Issue DateTitleAuthor(s)
2015Big data analytics and data security in the cloud via fully homomorphic encryptionWaziri, V.O; Alhassan, J.K; Ismaila, I.; Noel, M.D
2022-12Comparative Evaluation of Image Segmentation Techniques for Flood Detection in High-Resolution Satellite ImageryAgbo, C; Mohammed, A.D.; Alhassan, J.K; Adepoju, Solomon Adelowo
2020-09A Comparative Experimental Evaluation of the Detection Rates and Removal Abilities of Fifteen Malware Detector Tools on Xpaj.MBR RootkitSubairu, S.O; Alhassan, J.K; Nwaocha, V.O; Saidu, I.R
2018Detection of a Real-time Cyber-attack using Locator Agent Algorithm (C006)Isah, Abdulkadir Onivehu; Alhassan, J.K; Ismaila, Idris; Adebayo, O. Surajudeen
2020Empirical Design Framework for Development of Convolutional Neural Network Based ModelSubairu, S.O; Alhassan, J.K; Abdulhamid, S.M; Ojeniyi, J.A
2020An Experimental Approach to Unravel Effects of Malware on System Network InterfaceSubairu, Sikiru Olanrewaju; Alhassan, J.K; Sanjay, Misra; Abayomi-Alli, Olusola; Ahuja, Ravin; Damasevicius, Robertas; Maskeliunas, Rytis
2020Formulation of Quick Response Code Dataset for Machine learning AnalysisSubairu, S. O; Alhassan, J.K; Abdulhamid, S.M; Ojeniyi, J.A
2017The Imperatives of Electrical Redundancy and Contingency Design for Critical Sections in a University Power Supply NetworkIsah, Abdulkadir Onivehu; Alhassan, J.K; Subairu, S.O; Tola, O.J; Ambafi, J.G
2019Investigation of Vulnerabilities of Oil and Gas Critical Infrastructures and Developing a Tracking Algorithm to Track Malicious Attacks on the Stream.Isah, O.A; Alhassan, J.K; Ismaila, Idris; Adebayo, O. S; Onuja, A. M
2016-07Network System Design for Combating Cybercrime in NigeriaIsah, A.O; Alhassan, J.K; Sanjay, Misra; Ismaila, Idris; Broderick, Crawford; Ricardo, Soto
2020-11-24A Review of Detection Methodologies for Quick Response code Phishing AttacksSubairu, S.O; Alhassan, J.K; Abdulhamid, S.M; Ojeniyi, J.A
2022-11-01Ring Learning With Error-Based Encryption Scheme for the Privacy of Electronic Health Records ManagementAbdulkadir, U; Waziri, V.O; Alhassan, J.K; Ismaila, I