Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 144
Issue Date | Title | Author(s) |
2018 | Detection of a Real-time Cyber-attack using Locator Agent Algorithm | Isah, Abdulkadir Onivehu; Alhassan, J. K; Idris, I.; Adebayo, O. S. |
2019 | Investigation of Vulnerability of Oil and Gas Critical Infrastructures and Developing a tracking Algorithm to track malicious attacks on the streams | Isah, Abdulkadir Onivehu; Alhassan, J. K.; Idris, I.; Adebayo, O. S.; Onuja, A. M. |
2015 | Multi-Layer Access Control for Bring Your Own Device Environment | Olalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol |
2016 | Real-Time Malware Uniform Resource Locator Detection: Identification of Novel Discriminative Features through Manual Examination and Empirical Analysis | Olalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol |
2016 | Identification and Evaluation of Discriminative Lexical Features of Malware URL for Real-Time Classification | Olalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol |
2017 | Real-time Malware URL detection system based on Multi-layer Perceptron Neural Networks | Abdullah, Mohd Taufik; Olalere, Morufu; Mahmod, Ramlan; Abdullah, Azizol |
2017 | Forensic Acquisition of Data from a Crypt 12 Encrypted Database of Whatsapps | Alhassan, John K; Abubakar, Bilikisu; Olalere, Morufu; Abdulhamid, Shafi'i Muhammad; Ahmed, suleiman |
2017 | Mitigation of Sybil Attack on A Campus Network (Canet) Using Inter-Arrival Time Threshold and Physical Address Comparison | Waziri, Onomza Victor; Jimoh, Balikis Bukola; Olalere, Morufu; Abdulhamid, Shafi'I Muhammad; Idris, Ismaila |
2018 | A Systematic Literature Review on Detection, Prevention and Classification with Machine Learning Approach | Olalere, Morufu; Egigogo, Raji Abdullahi; Umar, Rukayya; Abdulhamid, Shafi'i Muhammad |
2019-06 | Comparative Analysis of Performance of Different Machine Learning Algorithms for Prediction of Success of Bank Telemarketing | Mohammed, Aliyu Aishatu; Olalere, Morufu; Mohammed, Abdullahi Ibrahim |
2016 | A Review of Top Open Source Password Cracking Tools | Yisa, Victor; Baba, Meshach; Olaniyi, Emmanuel |
2019-09 | Performance Evaluation of Ant Lion Optimization and Particle Swarm Optimiztion for Uncapacitated Facility Location Problem (UFLP) | Shehu, Hussaina; Olalere, Morufu |
2019-10 | Detection of Distributed Denial of Service (DDoS) with Linear Support Vector Machine | Nnaba, Yisa Rhoda; Olalere, Morufu |
2015-11 | Novel Solution for Addressing Identity Theft and Cheating in Electronic Examinations using Mouse Dynamics | Baba, Meshach; Yisa, Victor L. |
2016-11 | A Review of Top Open Source Password Cracking Tools | Baba, Meshach; Yisa, Victor L.; Olaniyi, Emmanuel Tosin |
2015 | Mobile Spamming In Nigeria, an Empirical Survey | Oluwafemi, Osho; Yisa, Victor; Ogunleke, Olasunkanmi; Abdulhamid, Shafi'i |
2019 | Enhanced Decision Tree-J48 with SMOTE Machine Learning Algorithm for Effective Botnet Detection | Adeleke, Ilyas; Ismaila, Idris; Olalere, Morufu |
2019 | Performance Evaluation of Machine Learning Algorithms for Hypertext Transfer Protocol Distributed Denial of Service Intrusion Detection | Umar, Rukaya; Olalere, Morufu; Idris, Ismaila; Egigogo, Raji Abdullahi; Bolarin, G, |
2019 | Machine Learning Approach for Detection of Spam Url: Performance Evaluation of Selected Algorithms | Okpanachi, Ahiaba Moses; Olalere, Morufu |
2019-12 | A Systematic Literature Review: Application, Challenges and Technology of Blockchain in Healthcare | Nnaba, Y. R.; Olalere, Morufu; Ojeniyi, J. A. |
Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 144