Collection's Items (Sorted by Submit Date in Descending order): 181 to 187 of 187
Issue Date | Title | Author(s) |
2016-11 | SIM Cards Forensic Capability and Evaluation of Extraction Tools | Idris, Ismaila; Alhassan, J. K.; Waziri, Victor O.; Majigi, Muhammad Umar |
2016-11 | Threat Modeling of Electronic Health Systems and Mitigating Countermeasures | Alhassan, J. K.; Abba, Emmanuel; Olaniyi, O. M.; Waziri, Victor O. |
2016-11 | Data Loss Prevention and Challenges Faced in their Deployments | Waziri, Victor O.; Ismaila, Idris; Alhassan, J. K.; Adedayo, Bolaji O. |
2016-11 | Securing File on Cloud Computing System using Encryption Software: A Comparative Analysis | Waziri, Victor O.; Alhassan, J. K.; Ismaila, Idris; Raji, Abdullahi Egigogo |
2016-11 | A Secure Method to Hide Confidential Data Using Cryptography and Steganography | Alhassan, J. K.; Ismaila, Idris; Waziri, Victor O.; Abdulkadir, Adamu |
2016-11 | An Infallible Technique for Hiding Confidential Data in Compressed Video using LSB and RSA Algorithm | Idris, Ismaila; Onoja, Emmanuel Oche; Alhassan, J. K. |
2012 | Artificial Neural Network as Kernel of Image Analysis Software. | Nedvedz, A.; Alhassan, J. K.; Belotserkovsky, A |
Collection's Items (Sorted by Submit Date in Descending order): 181 to 187 of 187