Cyber Security Science : [144] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 121 to 140 of 144
Issue DateTitleAuthor(s)
2018-06-10Hybrid gradient descent cuckoo search (HGDCS) algorithm for resource scheduling in IaaS cloud computing environmentMadni, Syed Hamid Hussain; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i Muhammad; Ali, Javed
2020-07Comparative Analysis of Machine Learning Classifiers for Detecting Malware in Portable Executable FileNanven, Fadan David; Olalere, Morufu
2021-02Students Academic Performance Prediction Based on Square Root Data Transformation and Ensemble TechniqueAbdullahi, Wokili; Olalere, Morufu
2021-02Analysis of Cybercrime in NigeriaMuhammad, Abubakar Idris; Hamisu, Muhammad; Mansour, Ali; Olalere, Morufu
2021-03Comparative Study: Machine Learning Classification Algorithms for Backdoor DetectionAbdullahi, Lawal; Olalere, Morufu
2021Sooner Lightweight cryptosystem: Towardss Privacy Preservation of Resource-Constrained Devices.Alfa, Abraham Ayegba; Alhassan, John Kolo; Olaniyi, Olayemi Mikail; Olalere, Morufu
2018-12Quantum Cryptography – Currend Methods and Technology. 11th – 13th December, 2018Gadzama, Emmanuel H; Adebayo, Olawale Surajudeen; Ojeniyi, Joseph A.
2020Tracking of Malicious Attacks on Data Online: A Systematic ReviewIsah, Abdulkadir O.; Alhassan, John K; Ismaila, Idris; Adebayo, Olawale Surajudeen
2019Development of a Secured e-voting system with OTP as Second Order Authentication.Habu, Salami J.; Adebayo, Olawale S.; Isah, Abdulkadir O.; Lawal, Kehinde H.; Alhassan, John K.
2021Medical Expert System for Diagnosis and Remedy for Infectious Diseases.Yahaya, M.S; Lawal, R.D; Etuk, S.O; Hussaini, A.Z; Noel, M.D
2018Evaluation of Mobile Banking Services Usage: A case Study of Niger State.Baba, M.; Noel, M.D; Yisa, L.V; Olatunde, M.O
2019Stateful Hash-based Digital Signature Schemes for Bitcoin CryptocurrencyNoel, M D; Waziri, O.V; Abdulhamid, M.S; Ojeniyi, A.J
2020Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin Transactions.Noel, M.D; Waziri, O.V; Abdulhamid, M.S; Ojeniyi, A.J
2018Performance Analysis of Classification Algorithms for Distributed Denial of Service Attacks Detection in a Distributed Network EnvironmentAdebayo, O.S; Abdullahi, A.; Noel, M.D
2020Framework for the Detection of Android Malware using Artificial Immune SystemNdatsu, Zainab; Adebayo, Olawale Surajudeen
2014An Intelligence based Model for the Prevention of Advanced Cyber-attacksAdebayo, Olawale Surajudeen; Normaziah, Abdul Aziz
2014Techniques for Analysing Android MalwareAdebayo, Olawale Surajudeen; Normaziah, Abdul Aziz
2014Android Malware Classification Using Static Code Analysis and Apriori Algorithm Improved with particle swarm optimizationAdebayo, Olawale Surajudeen; Normaziah, Abdul Aziz
2018-04Performance Analysis of Classification Algorithms for DDoS Attack Detection in a Distributed Network Environment. , 24th – 27th April, 2018. Baze University AbujaAdebayo, Olawale Surajudeen; Noel, M. D; Abdulmutalab, M.; Baba, Mesach; Abdulhamid, Shafi’í Muhammad; Suleiman, Ahmad
2019Fully Homomorphic Encryption: An Antidote to Cloud Data Security and Privacy ConcernsAbdullah, Monday Jubrin; Ikechukwu, Izeagbu; Adebayo, Olawale Surajudeen
Collection's Items (Sorted by Submit Date in Descending order): 121 to 140 of 144