Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 144
Issue Date | Title | Author(s) |
2021 | An Enhanced FFT Algorithm: Framework for Keystrokes Acoustic Emanations Denoising Approach on Real-Time Environment | Ahmad, Suleiman; Alhassan, John Kolo; Abdulhamid, Shafi'i Muhammad; Zubair, Suleiman |
2010 | OPNET IT GURU Academic Edition toEnhance Networking Education in Nigeria Universities | Zubair, Suleiman; Ahmad, Suleiman; AbdulAzeez, Hassan T.; Salihu, Bala A. |
2024 | Designing an email header analysis tool for cyber threat intelligence | Abdulazeez, Hassan. T.; Ahmad, Suleiman; Raji, A.; Maliki, D. |
2019-07 | ICT ARCHITECTURE FOR NATIONAL SECURITY | Alabi, I.O.; Ojeniyi, J.A.; Ismail, A.A.; Ahmad, S. I; Abdulazeez, H.T. |
2023-10-16 | Detection Of Ransomware Using Process-Behaviour Analysis And Machine Learning Techniques | - |
2023-10-16 | The Digital Evidence Acquisition Challenges In Infrastructure-As-A-Service(Iaas) Cloud Model: A Systematic Literature Review | - |
2023-10-16 | A Vunerability Detector For Hyperledger Fabric Smart Contract Using Chaincode Analyzer | Adamu Shamsudeen Kulho, Victor Onomza Waziri, Ismaila Idris, Joseph Adebayo Ojeniyi, Sikiru Olanrewaju Subairu |
2017-10-17 | Comparative Analysis of the Accuracy of Forensic Results obtained from Window and Android Platforms | Alhassan, John K.; Abdulazeez, Hassan T.; Ahmad, Suleiman; Abdulhamid, Shafi'i Muhammad; Adebayo, Olawale S. |
2023 | DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION TECHNIQUE BASE ON ARTIFICIAL NEUTRAL NETWORKS: SYSTEMATIC LITERATURE REVIEW | Abdul-karim Baba Oshoma; Morufu Olalere; Ismaila Idris; Joseph Adebayo Ojeniyi; Abdulkadir Onivehu Isah |
2023 | A SYSTEMATIC LITERATURE REVIEW OF CLOUD RADIO ACCESS NETWORK AND NETWORK SLICING TECHNOLOGY ON 5G | W. M Jonah; J. K. Alhassani; Ismaila Idris; J. A. Ojeniyi; O. S. Adebayo; A. O. Isah |
2023 | SYSTEMATIC LITERATURE REVIEW OF ATTACK ON MEDICAL CYBERPHYSICAL SYSTEMS (MCPS) | Michael, O. U.; Waziri, V. O.; Ismaila Idris.; Ojeniyi, J. A.,; Adebayo, O. S.; Isah, A. O. |
2024 | A Comprehensive Review on Techniques, Tools and Open Issue in Blockchain and Smart Contract Development | Hafiz O. Haruna; Ismaila Idris; Joseph Ojeniyi; Abdulkadir O. Isah; Sikiru O. Subaiyru |
2024 | A SYSTEMATIC LITERATURE REVIEW OF DIGITAL FORENSIC INVESTIGATION METHODOLOGIES: TRENDS, FRAMEWORKS, TECHNIQUES, CHALLENGES, SOLUTIONS AND OPEN ISSUES | Masu’d Balarabe; Ismaila Idris; Joseph Ojeniyi; Abdulkadir Onivehu Isah |
2022 | Cryptocurrency Fraud Detection: A systematic Literature review | Hussaini, Y,; Waziri, V.O.; Isah, A. O.; Ojeniyi, J A |
2019-07 | ICT ARCHITECTURE FOR NATIONAL SECURITY | Alabi, I. O; Ojeniyi, J. A; Ismail, A. A; Ahmad, Suleiman; Abdulazeez, Hassan T. |
2010-11-08 | Design of a Trapdoor for Password Access | Ahmad, Suleiman; Zubair, Suleiman.; Abdulazeez, Hassan. T; Salihu, Bala A.; Idris, L.; Ibrahim, A. |
2010-11-06 | Integrating OPNET IT Guru to Enhance Networking Education in Nigerian Universities. | Zubair, Suleiman; Ahmad, Suleiman.; Abdulazeez, Hassan. T; Salihu, Bala A. |
2023-04-08 | Cybersecurity Infrastructure Defense and Capacity Review for Nigeria with Digital Economy Impact | Ismaila, Idris, .; Uduimoh, Andrew Anogie; Omeiza, Haruna Hafiz |
2023-04-18 | Cybersecurity Infrastructure Defense and Capacity Review for Nigeria with Digital Economy Impact. | Ismaila, Idris; Andrew, Anogie Uduimoh; Hafiz, Omeiza Haruna |
2021 | Integration Of Consortium Blockchain Model In The Nigerian Banking Sector | Ojerinde, O. A.; Salawu, J.; A., Abisoye O.; A., Uduimoh, A. |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 144