Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 144
Issue Date | Title | Author(s) |
2020-07-02 | Smart Home Automation System Using ZigBee, Bluetooth and Arduino Technologies | Taiwo, O.,; Ezugwu, A. E.,; Rana, N.; Abdulhamid, Shafi’i Muhammad |
2020-03-02 | A Review of Detection Methodologies for Quick Response code Phishing Attacks | Sikiru, Subairu; John, Alhassan; Abdulhamid, Shafi’i Muhammad; Ojeniyi, Joseph |
2020-08-12 | An Intelligent Machine Learning-Based Real-Time Public Transport System | Skhosana, M.; Ezugwu, A. E.; Rana, N.; Abdulhamid, Shafi’i Muhammad |
2020-03-20 | Genetic Search Wrapper-Based Naïve Bayes Anomaly Detection Model for Fog Computing Environment | Onah, J; Abdulhamid, Shafi’i Muhammad; Misra, Shafi’i Muhammad; Sharma, M. M.,; Rana, N.; Oluranti, J. |
2020-12-03 | Antlion Optimization-Based Feature Selection Scheme for Cloud Intrusion Detection Using Naïve Bayes Algorithm | Christopher, Haruna Atabo; Abdulhamid, Shafi’i Muhammad; Misra, Sanjay; Odun-Ayo, I.; Sharma, M. M. |
2019-09 | Investigation of Vulnerability of Oil and Gas Critical Infrastructures and Developing a Tracking Algorithm to track Malicious Attacks on the Streams | Isah, Abdulkadir O.; Alhassan, John K; Ismaila, Idris; Adebayo, Olawale Surajudeen; Onuja, Abdulkadir S. |
2019 | Investigation of Vulnerabilities of Oil and Gas Critical Infrastructures and Developing a Tracking Algorithm to Track Malicious Attacks on the Stream. | Isah, O.A; Alhassan, J.K; Ismaila, Idris; Adebayo, O. S; Onuja, A. M |
2021 | Sooner Lightweight cryptosystem: Towards Privacy Preservation of Resource-Constrained Devices | Alfa, Abraham Ayegba; Alhassan, John Kolo; Olaniyi, Olayemi Mikail; Olalere, Morufu |
2020 | Analysis and Comparison of Key Revocation Protocols in Wireless Sensor Network | Taofeek, Yusuf; Waziri, Victor Onomza; Abdullahi, Bashir Mohammed; Olalere, Morufu |
2018 | Detection of a Real-time Cyber-attack using Locator Agent Algorithm (C006) | Isah, Abdulkadir Onivehu; Alhassan, J.K; Ismaila, Idris; Adebayo, O. Surajudeen |
2011-12-14 | Negative Selection Algorithm In Artificial Immune System For Spam Detection | Ismaila, Idris; Ali, Selamat |
2016-07 | Network System Design for Combating Cybercrime in Nigeria | Isah, A.O; Alhassan, J.K; Sanjay, Misra; Ismaila, Idris; Broderick, Crawford; Ricardo, Soto |
2017-10 | Mitigation of Sybil Attack on A Campus Network (CANET) Using Inter-Arrival Time Threshold and Physical Address Comparison | Victor, Onomza Waziri; Morufu, Olalere; Shafi’i, Muhammad A.; Ismaila, Idris |
2020-11-24 | A Review of Detection Methodologies for Quick Response code Phishing Attacks | Subairu, S.O; Alhassan, J.K; Abdulhamid, S.M; Ojeniyi, J.A |
2017 | The Imperatives of Electrical Redundancy and Contingency Design for Critical Sections in a University Power Supply Network | Isah, Abdulkadir Onivehu; Alhassan, J.K; Subairu, S.O; Tola, O.J; Ambafi, J.G |
2020-12-29 | Integrity Assurance for Small Scale Digital Devices Based Evidence for Cyber Crime Investigation | Muhammad, M. K.; Ismaila, Idris; Lukman, I. |
2016 | INTEGRATION OF PARENTAL ALERT SYSTEM INTO STUDENTS’ ONLINE PAYMENT SYSTEM | Isah, Abdulkadir Onivehu; Alhassan, J. K; Waziri, Victor O.; Lawal, K. H. |
2016 | Network System Design for Combating Cybercrime in Nigeria | Isah, Abdulkadir Onivehu; Alhassan, J. K.; Sanjay, Misra; Idris, I; Crawford, Broderick; Soto, Ricardo |
2018 | Development of a Secured e-Voting System with OTP as Second Order Authentication | Salami, Habu J.; Adebayo, O. S.; Isah, Abdulkadir Onivehu; Lawal, K. H.; Alhassan, J. K. |
2017 | The Imperatives of Electrical Redundancy and Contingency Design for Critical Sections in a University Power Supply Network | Isah, Abdulkadir Onivehu; Alhassan, J. K.; Subairu, S. O.; Tola, O. J.; Ambafi, J. G. |
Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 144