Collection's Items (Sorted by Submit Date in Descending order): 121 to 140 of 144
Issue Date | Title | Author(s) |
2018-06-10 | Hybrid gradient descent cuckoo search (HGDCS) algorithm for resource scheduling in IaaS cloud computing environment | Madni, Syed Hamid Hussain; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i Muhammad; Ali, Javed |
2020-07 | Comparative Analysis of Machine Learning Classifiers for Detecting Malware in Portable Executable File | Nanven, Fadan David; Olalere, Morufu |
2021-02 | Students Academic Performance Prediction Based on Square Root Data Transformation and Ensemble Technique | Abdullahi, Wokili; Olalere, Morufu |
2021-02 | Analysis of Cybercrime in Nigeria | Muhammad, Abubakar Idris; Hamisu, Muhammad; Mansour, Ali; Olalere, Morufu |
2021-03 | Comparative Study: Machine Learning Classification Algorithms for Backdoor Detection | Abdullahi, Lawal; Olalere, Morufu |
2021 | Sooner Lightweight cryptosystem: Towardss Privacy Preservation of Resource-Constrained Devices. | Alfa, Abraham Ayegba; Alhassan, John Kolo; Olaniyi, Olayemi Mikail; Olalere, Morufu |
2018-12 | Quantum Cryptography – Currend Methods and Technology. 11th – 13th December, 2018 | Gadzama, Emmanuel H; Adebayo, Olawale Surajudeen; Ojeniyi, Joseph A. |
2020 | Tracking of Malicious Attacks on Data Online: A Systematic Review | Isah, Abdulkadir O.; Alhassan, John K; Ismaila, Idris; Adebayo, Olawale Surajudeen |
2019 | Development of a Secured e-voting system with OTP as Second Order Authentication. | Habu, Salami J.; Adebayo, Olawale S.; Isah, Abdulkadir O.; Lawal, Kehinde H.; Alhassan, John K. |
2021 | Medical Expert System for Diagnosis and Remedy for Infectious Diseases. | Yahaya, M.S; Lawal, R.D; Etuk, S.O; Hussaini, A.Z; Noel, M.D |
2018 | Evaluation of Mobile Banking Services Usage: A case Study of Niger State. | Baba, M.; Noel, M.D; Yisa, L.V; Olatunde, M.O |
2019 | Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency | Noel, M D; Waziri, O.V; Abdulhamid, M.S; Ojeniyi, A.J |
2020 | Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin Transactions. | Noel, M.D; Waziri, O.V; Abdulhamid, M.S; Ojeniyi, A.J |
2018 | Performance Analysis of Classification Algorithms for Distributed Denial of Service Attacks Detection in a Distributed Network Environment | Adebayo, O.S; Abdullahi, A.; Noel, M.D |
2020 | Framework for the Detection of Android Malware using Artificial Immune System | Ndatsu, Zainab; Adebayo, Olawale Surajudeen |
2014 | An Intelligence based Model for the Prevention of Advanced Cyber-attacks | Adebayo, Olawale Surajudeen; Normaziah, Abdul Aziz |
2014 | Techniques for Analysing Android Malware | Adebayo, Olawale Surajudeen; Normaziah, Abdul Aziz |
2014 | Android Malware Classification Using Static Code Analysis and Apriori Algorithm Improved with particle swarm optimization | Adebayo, Olawale Surajudeen; Normaziah, Abdul Aziz |
2018-04 | Performance Analysis of Classification Algorithms for DDoS Attack Detection in a Distributed Network Environment. , 24th – 27th April, 2018. Baze University Abuja | Adebayo, Olawale Surajudeen; Noel, M. D; Abdulmutalab, M.; Baba, Mesach; Abdulhamid, Shafi’í Muhammad; Suleiman, Ahmad |
2019 | Fully Homomorphic Encryption: An Antidote to Cloud Data Security and Privacy Concerns | Abdullah, Monday Jubrin; Ikechukwu, Izeagbu; Adebayo, Olawale Surajudeen |
Collection's Items (Sorted by Submit Date in Descending order): 121 to 140 of 144