Cyber Security Science : [144] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 144
Issue DateTitleAuthor(s)
2018Detection of a Real-time Cyber-attack using Locator Agent AlgorithmIsah, Abdulkadir Onivehu; Alhassan, J. K; Idris, I.; Adebayo, O. S.
2019Investigation of Vulnerability of Oil and Gas Critical Infrastructures and Developing a tracking Algorithm to track malicious attacks on the streamsIsah, Abdulkadir Onivehu; Alhassan, J. K.; Idris, I.; Adebayo, O. S.; Onuja, A. M.
2015Multi-Layer Access Control for Bring Your Own Device EnvironmentOlalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol
2016Real-Time Malware Uniform Resource Locator Detection: Identification of Novel Discriminative Features through Manual Examination and Empirical AnalysisOlalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol
2016Identification and Evaluation of Discriminative Lexical Features of Malware URL for Real-Time ClassificationOlalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol
2017Real-time Malware URL detection system based on Multi-layer Perceptron Neural NetworksAbdullah, Mohd Taufik; Olalere, Morufu; Mahmod, Ramlan; Abdullah, Azizol
2017Forensic Acquisition of Data from a Crypt 12 Encrypted Database of WhatsappsAlhassan, John K; Abubakar, Bilikisu; Olalere, Morufu; Abdulhamid, Shafi'i Muhammad; Ahmed, suleiman
2017Mitigation of Sybil Attack on A Campus Network (Canet) Using Inter-Arrival Time Threshold and Physical Address ComparisonWaziri, Onomza Victor; Jimoh, Balikis Bukola; Olalere, Morufu; Abdulhamid, Shafi'I Muhammad; Idris, Ismaila
2018A Systematic Literature Review on Detection, Prevention and Classification with Machine Learning ApproachOlalere, Morufu; Egigogo, Raji Abdullahi; Umar, Rukayya; Abdulhamid, Shafi'i Muhammad
2019-06Comparative Analysis of Performance of Different Machine Learning Algorithms for Prediction of Success of Bank TelemarketingMohammed, Aliyu Aishatu; Olalere, Morufu; Mohammed, Abdullahi Ibrahim
2016A Review of Top Open Source Password Cracking ToolsYisa, Victor; Baba, Meshach; Olaniyi, Emmanuel
2019-09Performance Evaluation of Ant Lion Optimization and Particle Swarm Optimiztion for Uncapacitated Facility Location Problem (UFLP)Shehu, Hussaina; Olalere, Morufu
2019-10Detection of Distributed Denial of Service (DDoS) with Linear Support Vector MachineNnaba, Yisa Rhoda; Olalere, Morufu
2015-11Novel Solution for Addressing Identity Theft and Cheating in Electronic Examinations using Mouse DynamicsBaba, Meshach; Yisa, Victor L.
2016-11A Review of Top Open Source Password Cracking ToolsBaba, Meshach; Yisa, Victor L.; Olaniyi, Emmanuel Tosin
2015Mobile Spamming In Nigeria, an Empirical SurveyOluwafemi, Osho; Yisa, Victor; Ogunleke, Olasunkanmi; Abdulhamid, Shafi'i
2019Enhanced Decision Tree-J48 with SMOTE Machine Learning Algorithm for Effective Botnet DetectionAdeleke, Ilyas; Ismaila, Idris; Olalere, Morufu
2019Performance Evaluation of Machine Learning Algorithms for Hypertext Transfer Protocol Distributed Denial of Service Intrusion DetectionUmar, Rukaya; Olalere, Morufu; Idris, Ismaila; Egigogo, Raji Abdullahi; Bolarin, G,
2019Machine Learning Approach for Detection of Spam Url: Performance Evaluation of Selected AlgorithmsOkpanachi, Ahiaba Moses; Olalere, Morufu
2019-12A Systematic Literature Review: Application, Challenges and Technology of Blockchain in HealthcareNnaba, Y. R.; Olalere, Morufu; Ojeniyi, J. A.
Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 144