Cyber Security Science : [144] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 144
Issue DateTitleAuthor(s)
2020-07-02Smart Home Automation System Using ZigBee, Bluetooth and Arduino TechnologiesTaiwo, O.,; Ezugwu, A. E.,; Rana, N.; Abdulhamid, Shafi’i Muhammad
2020-03-02A Review of Detection Methodologies for Quick Response code Phishing AttacksSikiru, Subairu; John, Alhassan; Abdulhamid, Shafi’i Muhammad; Ojeniyi, Joseph
2020-08-12An Intelligent Machine Learning-Based Real-Time Public Transport SystemSkhosana, M.; Ezugwu, A. E.; Rana, N.; Abdulhamid, Shafi’i Muhammad
2020-03-20Genetic Search Wrapper-Based Naïve Bayes Anomaly Detection Model for Fog Computing EnvironmentOnah, J; Abdulhamid, Shafi’i Muhammad; Misra, Shafi’i Muhammad; Sharma, M. M.,; Rana, N.; Oluranti, J.
2020-12-03Antlion Optimization-Based Feature Selection Scheme for Cloud Intrusion Detection Using Naïve Bayes AlgorithmChristopher, Haruna Atabo; Abdulhamid, Shafi’i Muhammad; Misra, Sanjay; Odun-Ayo, I.; Sharma, M. M.
2019-09Investigation of Vulnerability of Oil and Gas Critical Infrastructures and Developing a Tracking Algorithm to track Malicious Attacks on the StreamsIsah, Abdulkadir O.; Alhassan, John K; Ismaila, Idris; Adebayo, Olawale Surajudeen; Onuja, Abdulkadir S.
2019Investigation of Vulnerabilities of Oil and Gas Critical Infrastructures and Developing a Tracking Algorithm to Track Malicious Attacks on the Stream.Isah, O.A; Alhassan, J.K; Ismaila, Idris; Adebayo, O. S; Onuja, A. M
2021Sooner Lightweight cryptosystem: Towards Privacy Preservation of Resource-Constrained DevicesAlfa, Abraham Ayegba; Alhassan, John Kolo; Olaniyi, Olayemi Mikail; Olalere, Morufu
2020Analysis and Comparison of Key Revocation Protocols in Wireless Sensor NetworkTaofeek, Yusuf; Waziri, Victor Onomza; Abdullahi, Bashir Mohammed; Olalere, Morufu
2018Detection of a Real-time Cyber-attack using Locator Agent Algorithm (C006)Isah, Abdulkadir Onivehu; Alhassan, J.K; Ismaila, Idris; Adebayo, O. Surajudeen
2011-12-14Negative Selection Algorithm In Artificial Immune System For Spam DetectionIsmaila, Idris; Ali, Selamat
2016-07Network System Design for Combating Cybercrime in NigeriaIsah, A.O; Alhassan, J.K; Sanjay, Misra; Ismaila, Idris; Broderick, Crawford; Ricardo, Soto
2017-10Mitigation of Sybil Attack on A Campus Network (CANET) Using Inter-Arrival Time Threshold and Physical Address ComparisonVictor, Onomza Waziri; Morufu, Olalere; Shafi’i, Muhammad A.; Ismaila, Idris
2020-11-24A Review of Detection Methodologies for Quick Response code Phishing AttacksSubairu, S.O; Alhassan, J.K; Abdulhamid, S.M; Ojeniyi, J.A
2017The Imperatives of Electrical Redundancy and Contingency Design for Critical Sections in a University Power Supply NetworkIsah, Abdulkadir Onivehu; Alhassan, J.K; Subairu, S.O; Tola, O.J; Ambafi, J.G
2020-12-29Integrity Assurance for Small Scale Digital Devices Based Evidence for Cyber Crime InvestigationMuhammad, M. K.; Ismaila, Idris; Lukman, I.
2016INTEGRATION OF PARENTAL ALERT SYSTEM INTO STUDENTS’ ONLINE PAYMENT SYSTEMIsah, Abdulkadir Onivehu; Alhassan, J. K; Waziri, Victor O.; Lawal, K. H.
2016Network System Design for Combating Cybercrime in NigeriaIsah, Abdulkadir Onivehu; Alhassan, J. K.; Sanjay, Misra; Idris, I; Crawford, Broderick; Soto, Ricardo
2018Development of a Secured e-Voting System with OTP as Second Order AuthenticationSalami, Habu J.; Adebayo, O. S.; Isah, Abdulkadir Onivehu; Lawal, K. H.; Alhassan, J. K.
2017The Imperatives of Electrical Redundancy and Contingency Design for Critical Sections in a University Power Supply NetworkIsah, Abdulkadir Onivehu; Alhassan, J. K.; Subairu, S. O.; Tola, O. J.; Ambafi, J. G.
Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 144