Issue Date | Title | Author(s) |
2015 | Big data analytics and data security in the cloud via fully homomorphic encryption | Waziri, V.O; Alhassan, J.K; Ismaila, I.; Noel, M.D |
2022-12 | Comparative Evaluation of Image Segmentation Techniques for Flood Detection in High-Resolution Satellite Imagery | Agbo, C; Mohammed, A.D.; Alhassan, J.K; Adepoju, Solomon Adelowo |
2020-09 | A Comparative Experimental Evaluation of the Detection Rates and Removal Abilities of Fifteen Malware Detector Tools on Xpaj.MBR Rootkit | Subairu, S.O; Alhassan, J.K; Nwaocha, V.O; Saidu, I.R |
2018 | Detection of a Real-time Cyber-attack using Locator Agent Algorithm (C006) | Isah, Abdulkadir Onivehu; Alhassan, J.K; Ismaila, Idris; Adebayo, O. Surajudeen |
2020 | Empirical Design Framework for Development of Convolutional Neural Network Based Model | Subairu, S.O; Alhassan, J.K; Abdulhamid, S.M; Ojeniyi, J.A |
2020 | An Experimental Approach to Unravel Effects of Malware on System Network Interface | Subairu, Sikiru Olanrewaju; Alhassan, J.K; Sanjay, Misra; Abayomi-Alli, Olusola; Ahuja, Ravin; Damasevicius, Robertas; Maskeliunas, Rytis |
2020 | Formulation of Quick Response Code Dataset for Machine learning Analysis | Subairu, S. O; Alhassan, J.K; Abdulhamid, S.M; Ojeniyi, J.A |
2017 | The Imperatives of Electrical Redundancy and Contingency Design for Critical Sections in a University Power Supply Network | Isah, Abdulkadir Onivehu; Alhassan, J.K; Subairu, S.O; Tola, O.J; Ambafi, J.G |
2019 | Investigation of Vulnerabilities of Oil and Gas Critical Infrastructures and Developing a Tracking Algorithm to Track Malicious Attacks on the Stream. | Isah, O.A; Alhassan, J.K; Ismaila, Idris; Adebayo, O. S; Onuja, A. M |
2016-07 | Network System Design for Combating Cybercrime in Nigeria | Isah, A.O; Alhassan, J.K; Sanjay, Misra; Ismaila, Idris; Broderick, Crawford; Ricardo, Soto |
2020-11-24 | A Review of Detection Methodologies for Quick Response code Phishing Attacks | Subairu, S.O; Alhassan, J.K; Abdulhamid, S.M; Ojeniyi, J.A |
2022-11-01 | Ring Learning With Error-Based Encryption Scheme for the Privacy of Electronic Health Records Management | Abdulkadir, U; Waziri, V.O; Alhassan, J.K; Ismaila, I |