Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 236
Issue Date | Title | Author(s) |
2023-04-04 | Systematic Literature Review and Metadata Analysis of Insider Threat Detection Mechanism | Ismaila, Idris; Adeleke, Nafisa Damilola |
2023-03-14 | Impact Analysis and Features for DDOS Attacks Detection in SDN | Abdullahi, Aishatu Wabi; Ismaila, Idris; Olayemi, Mikail Olaniyi; Joseph, A. Ojeniyi |
2014 | Assessment of Information Security Awareness among Online Banking Costumers in Nigeria | Olalere, Morufu; Waziri, Onomza Victor; Ismaila, Idris; Adebayo, Olawale Surajudeen; Ololade, O |
2020-09-10 | Improved Genetically Optimized Neural Network Algorithm for the Classification of Distributed Denial of Service Attack | Gadzama, Emmanuel Hamman; Adebayo, Olawale Surajudeen |
2021-08-20 | Convolutional neural network-based approach for dermatological disease prediction | Afiz, Adeniyi; Bashir, Sulaimon Adebayo; Adebayo, Olawale Surajudeen; Ganiyu, Shefiu Olusegun |
2022-10-20 | Intelligent Criminal Identification System For Semi-Regulated Environments | Ganiyu, Shefiu Olusegun; Akpagher, T. D.; Olaniyi, Mikail Olayemi; Adebayo, Olawale Surajudeen |
2022 | Review and analysis of classical algorithms and hash-based post-quantum algorithm | Noel, M. D.; Waziri, V.O.; Abdulhmid, S. M.; Ojeniyi, Joseph Adebayo |
2018 | Security Risk Analysis and Management in mobile wallet transaction: A Case study of Pagatech Nigeria Limited | Abdulrahamn, M. D.; Alhassan, J. K.; Ojeniyi, Joseph Adebayo; Abdulhamid, S. M. |
2018 | Security Risk Analysis and Management in Online Retailing Transactions, using Konga as a case study | Edward, J. M.; Idris, I; Ojeniyi, Joseph Adebayo; Abdulhamid, S. M. |
2017 | HTTP Flood Mitigation Using Gateway Inspection and Second Chance Approach Analysis | Idris, I; Tobi, O. J.; Waziri, V. O.; Alhassan, J. K.; Ojeniyi, Joseph Adebayo |
2018 | A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection Attack | Olalere, M; Egigogo, R. A.; Ojeniyi, Joseph Adebayo; Idris, I; Jimoh, R. G. |
2819 | Security Risk Analysis in Online Banking Transactions: Using Diamond Bank as a Case Study | Ojeniyi, Joseph Adebayo; Edward, E.O.; Abdulhmid, S. M. |
2018 | Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniques | Ojeniyi, Joseph Adebayo; Adedayo, B. O.; Ismaila, I; Shafii, A. M. |
2015 | Organizational Attendance Record System: Fraud and A Proposed Facial Recognition Technique | Olalere, M; Ojeniyi, Joseph Adebayo; Osho, F; Ugwu, J.N. |
2013 | Network Security in Cloud Computing with Elliptic Curve Cryptography | Waziri, V. O.; Ojeniyi, Joseph Adebayo; Hakimi, D; Audu, I; Abubakar, S.M.; Abdullahi, M. B. |
2012 | information security on the communication network in Nigeria based on digital Signature | Adebayo, OS; Waziri, VO; Ojeniyi, Joseph Adebayo; Bashir, SA; Mishra, A |
2013 | Network Security in Cloud Computing with Elliptic Curve Cryptography | Waziri, V. O.; Ojeniyi, Joseph + "Adebayo" |
2021-08-31 | COVID-19 ANDROID-BASED TEXT-TO-SPEECH APPLICATION: AN INCLUSION OF PEOPLE LIVING WITH READING AND SIGHTING DISABILITIES | YAHAYA, M.S; EMMANUEL, I.O; NOEL, M.D; BENJAMIN, P.D |
2021-09-03 | Review and analysis of classical algorithms and hash-based post-quantum algorithm | Noel, Moses Dogonyaro; Waziri, Onomza Victor; Abdulhamid, Muhammad Shafii; Ojeniyi, Adebayo Joseph |
2021-09 | Secured E-Commerce System using ECC and Multimodal Biometrics | Onuja, Abdulkareem; Oyefolahan, Ishaq Oyebisi; Adebayo, Olawale Surajudeen; Isah, Abdulkadir O; Olaniyi, Mika'il Olayemi |
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 236