Issue Date | Title | Author(s) |
2014 | Active Defence: An Evolving Gaming Strategy for Attacker Defender in a Network Environment | Waziri, Victor Onomza; Anuonye, Stanley Obinna; Olalere, Morufu; Ismaila, Idris |
2014-09-09 | Active Defence: An Evolving Gaming Strategy for Attacker Defender in a Network Environment | Waziri, Victor Onomza; Anuonye, Stanley Obinna; Olalere, Morufu; Ismaila, Idris |
2020 | Analysis and Comparison of Key Revocation Protocols in Wireless Sensor Network | Taofeek, Yusuf; Waziri, Victor Onomza; Abdullahi, Bashir Mohammed; Olalere, Morufu |
2015-03 | The Application of Hybrid Cryptographic Algorithms for Cyber Warfare and Terrorism in a Nation Defence | Waziri, Victor Onomza; Alhassan, J. K.; Ismaila, Idris |
2015 | Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption. | Waziri, Victor Onomza; Alhassan, J. K.; Ismaila, Idris; Dogonyaro, Moses Noel |
2015 | Development of Secure Antivirus with the Artificial Immune System Model | Waziri, Victor Onomza; Alhassan, J. K.; Olalere, Morufu; Abdulkadir, Adamu |
2014 | e-fraud Forensics Investigation Techniques with Formal Concept Analysis | Waziri, Victor Onomza; Umar, Abdullahi; Olalere, Morufu |
2015 | Extracting Android Applications Data for Anomaly-based Malware Detection | Abah, Joshua; Waziri, Victor Onomza; Abdullahi, Muhammad Bashir; Adewale, Olumide Sunday; Ume, U. Arthur |
2015-11 | A Machine Learning Approach to Anomaly-Based Detection on Android Platforms | Abah, Joshua; Waziri, Victor Onomza; Abdullahi, Muhammad Bashir; Ume, Arthur; Adewale, Olumide Sunday |
2013 | A Negative Selection Algorithm Based-On E-Mail Classification Techniques | Waziri, Victor Onomza; Idris, Ismaila; Abdullahi, Muhammad Bashir; Danladi, Hakimi; Isah, Audu |
2013-11-27 | Network Security in Cloud Computing with Elliptic Curve Cryptography | Waziri, Victor Onomza; Adebayo, Ojeniyi Joseph; Danladi, Hakimi; Isah, Audu; Magaji, Abubakar Sadiq; Abdullahi, Muhammad Bashir |
2015 | Plastic Financial Fraud in the Most Populated Black Africa; Nigeria: The Mitigation Based-On One-Time Password | Waziri, Victor Onomza; Alhassan, J. K.; Ismaila, Idris; Tunde, Abdulrahman |
2015-02 | Plastic Financial Fraud In The Most Populated Black Africa; Nigeria:The Mitigation Based-On One-Time Password | Waziri, Victor Onomza; John, Alhassan; Ismaila, Idris; Abdulrahman, Tunde |
2011 | Privacy and National Security Issues in Social Networks: The Challenges | Abdulhamid, Shafi'i Muhammad; Ahmad, Suleiman; Waziri, Victor Onomza; Jibril, Fatima N. |
2018-04 | Privacy Preserving Classification Over Encrypted Data using Fully Homomorphic Encryption Technique | Jubrin, Abdullahi Monday; Waziri, Victor Onomza; Abdullahi, Muhammad Bashir; Idris, Ismaila |
2012-07-20 | Steganography and Its Applications in Information Dessimilation on the Web Using Images as Security Embeddment: A Wavelet Approach | Waziri, Victor Onomza; Isah, Audu; Ochoche, Abraham; Abdulhamid, Shafi’i Muhammad |
2014-02 | A Survey on Mobile Cloud Computing with Embedded Security Considerations | Waziri, Victor Onomza; Abah, Joshua; Adewale, Olumide Sunday; Abdullahi, Muhammad Bashir; Ume, Arthur |
2015-04 | Web-based Security Services based-on Elliptic Curves Cryptosystem | Waziri, Victor Onomza; Alhassan, J. K.; Danladi, Hakimi |