Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 144
Issue Date | Title | Author(s) |
2018 | Development of a Predictive Model for the Detection of CAPTCHA Smuggling Attacks using Supervised Deep Learning based Approach | Omoyele, M; Ojeniyi, Joseph Adebayo; Adebayo, O. S. |
2020 | Intelligent based Framework for Detection of Fake News in Social Media Platforms | Olusanjo, F; Ojeniyi, Joseph Adebayo; Oyeniyi, S |
2013-11-26 | Online Priority Aware streaming framework for Cognitive Radio Sensor Networks | Zubair, Suleiman; Fisal, Norsheila; Maqbool, Wajahat; AbdulAzeez, Hassan T. |
2017-10-17 | Comparative Analysis of the Accuracy of Forensic Results obtained from Window and Android Platforms | John, K Alhassan; AbdulAzeez, Hassan T.; Suleiman, Ahnad; Shafi'i, Muhammad Abdulhamid; Olawale, S Adebayo |
2008-08-02 | A review of intrution detection system architectures in mobile ad hoc networks | Abdulhamid, Shafi’i Muhammad |
2017-06-20 | Protecting the Core | Oluwafemi, Osho; Joseph, A. Ojeniyi; Abdulhamid, Shafi’i Muhammad |
2015-06-20 | Mobile Spamming in Nigeria: An Empirical Survey | Oluwafemi, Osho; Yisa, V. L.; Ogunleke, O. Y.; Abdulhamid, Shafi’i Muhammad |
2019-08-13 | Performance Analysis of Security Information and Event Management Solutions Detecting Web-Based Attacks | Morufu, Olalere; Juliana, Ndunagu; Abdulhamid, Shafi’i Muhammad; Odey, Peter |
2019-03-12 | Sinkhole attack detection in a wireless sensor networks using enhanced ant colony optimization to improve detection rate | Nwankwo, Kenneth E.; Abdulhamid, Shafi’i Muhammad |
2019-07-13 | Security Risk Analysis and Management in a Non-Interest Banking Sector | Joseph, A. Ojeniyi; Samuel, A. Oyeniyi; Abdulhamid, Shafi’i Muhammad |
2019-07-02 | Machine Learning Classification Algorithms for Phishing Detection: A Comparative Appraisal and Analysis | Noah, Ndakotsu Gana; Abdulhamid, Shafi’i Muhammad |
2019-07-04 | Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency | Moses, Noel Dogonyaro; Victor, Waziri Onomza; Abdulhamid, Shafi’i Muhammad; Joseph, Ojeniyi Adebayo |
2016-04-02 | Optimal resource scheduling technique for IaaS Cloud computing | Madni, Syed Hamid Hussain; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i Muhammad |
2014-04-12 | League Championship Algorithm Based Job Scheduling Scheme for Infrastructure as a Service Cloud | Abdulhamid, Shafi’i Muhammad; Abd Latiff, Shafi’i Muhammad |
2012-06-10 | An Improved AIS Based E-mail Classification Technique for Spam Detection | IDRIS, ISMAILA; Abdulhamid, Shafi’i Muhammad |
2014-08-20 | Grid-based Search Technique for Massive Academic Publications | Bashir, Mohammad Bakri; Muhammad Shafie, Abd Latiff; Abdulhamid, Shafi’i Muhammad; Loon, C. T. |
2018-03-20 | Secure Electronic Medical Records Transmission in Audio using NTRU Cryptosystem with Least Significant Bit Steganographic Technique | Abdulkadir, Adamu; Abdulhamid, Shafi’i Muhammad; Oluwafemi, Osho; John, K. Alhassan; Ismaila, Idris |
2019-05-13 | Nature Inspired Meta-Heuristic Algorithms for Deep Learning: Recent Progress and Novel Perspective | Chiroma, Haruna; Abdulsalam, Yau Gital; Abubakar, Adamu; Abdulhamid, Shafi’i Muhammad; Nadim, Rana |
2020-04-20 | Comparative Performance Analysis of Anti-virus Software | Moses, Noel Dogonyaro; Victor, Waziri Onomza; Abdulhamid, Shafi’i Muhammad; Obada, S. L. |
2020-04-01 | Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin transactions | Moses, Noel Dogonyaro; Victor, Waziri Onomza; Abdulhamid, Shafi’i Muhammad; Joseph, Ojeniyi Adebayo; Okoro, Malvis Ugonna |
Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 144