Cyber Security Science : [236] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 236
Issue DateTitleAuthor(s)
2014-04Email Spam Detection Generation Algorithm for Negative Selection Algorithm with Hamming Distance Partial Matching RulesIsmaila, Idris; Shafi‘i, Muhammad Abdulhamid; Abdulmalik, Mohammed; Umar, Dauda Suleiman; Nicholas, Akosu
2012Optimized Spam Classification Approach with Negative Selection AlgorithmIsmaila, Idris; Ali, Selamat
2020-09A Comparative Experimental Evaluation of the Detection Rates and Removal Abilities of Fifteen Malware Detector Tools on Xpaj.MBR RootkitSubairu, S.O; Alhassan, J.K; Nwaocha, V.O; Saidu, I.R
2020Empirical Design Framework for Development of Convolutional Neural Network Based ModelSubairu, S.O; Alhassan, J.K; Abdulhamid, S.M; Ojeniyi, J.A
2020Formulation of Quick Response Code Dataset for Machine learning AnalysisSubairu, S. O; Alhassan, J.K; Abdulhamid, S.M; Ojeniyi, J.A
2020An Experimental Approach to Unravel Effects of Malware on System Network InterfaceSubairu, Sikiru Olanrewaju; Alhassan, J.K; Sanjay, Misra; Abayomi-Alli, Olusola; Ahuja, Ravin; Damasevicius, Robertas; Maskeliunas, Rytis
2017Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on Transition. International Journal of Cyber-Security and Digital ForensicsIsah, A.O; Alhassan, JK; Olanrewaju, Sikiru Subairu; Enesi, Femi Aminu
2017-06-29Comparative Performance Study of Antimalware Tools on TDL-4 RootkitSubairu, S.O; Alhassan, JK; Isah, A.O
2016A Critical Analysis of Component-Based Software EngineeringSubairu, Sikiru Olanrewaju
2016-11Evaluating Capabilities Of Rootkits ToolsSubairu, Sikiru; Alhassan, John; Sanjay, Misra
2018SQL Injection Attack: A Systematic Literature Review on Detection, Prevention and Classification with Machine Learning Approach” 1st International Conference on ICT for National Development and Its Sustainability, Faculty of Communication and Information Sciences, University of Ilorin 2018.yisa, victor; raji, egigogo; Abdulhamid, Shafi'i
2012The Challenges of Missing Results of E-Examination in Nigerian Universities.Shitu, Kelani; Surajudeen, Adebayo; Yisa, Victor; Baba, meshach
2012THE SIMULATION OF PATH CONTROL AND ROUTE REDISTRIBUTION TECHNIQUES ON THE INTEGRATION OF WANs WITH DIFFERENT ROUTING PROTOCOLSAbdulhamid, Shafi'i; Yisa, Victor; Baba, meshach; Njoku, Collins
2018Password Knowledge versus Password Management PracticeAdama, Victor; Noel, Moses; Yisa, victor; Baba, meshach; Ekunday, Ayobami
2015Novel Solution for Addressing Identity Theft and Cheating in Electronic Examinations using Mouse DynamicsBaba, meshach; Yisa, victor
2019Towards a Digital Policing in Developing Nations: The Nigerian ContextIsmaila, Idris; Yisa, Victor; Ikuesan, Richard; Shakah, Imavah
2018-06A DIAGNOSIS SYSTEM FOR LASSA FEVER AND RELATED AILMENTS USING FUZZY LOGICAminu, Enesi Femi; Abiodun, Ahmed Ajani; Isah, Omeiza Rabiu; Anda, Ilyasu; Isah, Abdulkadir Onivehu; Zubairu, Hussaini Abubakar
2017Comparative Performance Study of Antimalware Tools on TDL-4 RootkitSubairu, S. O.; Isah, Abdulkadir Onivehu; Alhassan, J. K.
2017Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on TransitionIsah, Abdulkadir Onivehu; Alhassan, J. K; Olanrewaju, S. S; Aminu, Enesi Femi
2013-11Design and Construction of Wireless Personal Computer based Fuel Level Monitoring SystemTola, O. J.; Ambafi, A. J.; Isah, Abdulkadir Onivehu; Inyang, E.O
Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 236