Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 236
Issue Date | Title | Author(s) |
2014-04 | Email Spam Detection Generation Algorithm for Negative Selection Algorithm with Hamming Distance Partial Matching Rules | Ismaila, Idris; Shafi‘i, Muhammad Abdulhamid; Abdulmalik, Mohammed; Umar, Dauda Suleiman; Nicholas, Akosu |
2012 | Optimized Spam Classification Approach with Negative Selection Algorithm | Ismaila, Idris; Ali, Selamat |
2020-09 | A Comparative Experimental Evaluation of the Detection Rates and Removal Abilities of Fifteen Malware Detector Tools on Xpaj.MBR Rootkit | Subairu, S.O; Alhassan, J.K; Nwaocha, V.O; Saidu, I.R |
2020 | Empirical Design Framework for Development of Convolutional Neural Network Based Model | Subairu, S.O; Alhassan, J.K; Abdulhamid, S.M; Ojeniyi, J.A |
2020 | Formulation of Quick Response Code Dataset for Machine learning Analysis | Subairu, S. O; Alhassan, J.K; Abdulhamid, S.M; Ojeniyi, J.A |
2020 | An Experimental Approach to Unravel Effects of Malware on System Network Interface | Subairu, Sikiru Olanrewaju; Alhassan, J.K; Sanjay, Misra; Abayomi-Alli, Olusola; Ahuja, Ravin; Damasevicius, Robertas; Maskeliunas, Rytis |
2017 | Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on Transition. International Journal of Cyber-Security and Digital Forensics | Isah, A.O; Alhassan, JK; Olanrewaju, Sikiru Subairu; Enesi, Femi Aminu |
2017-06-29 | Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit | Subairu, S.O; Alhassan, JK; Isah, A.O |
2016 | A Critical Analysis of Component-Based Software Engineering | Subairu, Sikiru Olanrewaju |
2016-11 | Evaluating Capabilities Of Rootkits Tools | Subairu, Sikiru; Alhassan, John; Sanjay, Misra |
2018 | SQL Injection Attack: A Systematic Literature Review on Detection, Prevention and Classification with Machine Learning Approach” 1st International Conference on ICT for National Development and Its Sustainability, Faculty of Communication and Information Sciences, University of Ilorin 2018. | yisa, victor; raji, egigogo; Abdulhamid, Shafi'i |
2012 | The Challenges of Missing Results of E-Examination in Nigerian Universities. | Shitu, Kelani; Surajudeen, Adebayo; Yisa, Victor; Baba, meshach |
2012 | THE SIMULATION OF PATH CONTROL AND ROUTE REDISTRIBUTION TECHNIQUES ON THE INTEGRATION OF WANs WITH DIFFERENT ROUTING PROTOCOLS | Abdulhamid, Shafi'i; Yisa, Victor; Baba, meshach; Njoku, Collins |
2018 | Password Knowledge versus Password Management Practice | Adama, Victor; Noel, Moses; Yisa, victor; Baba, meshach; Ekunday, Ayobami |
2015 | Novel Solution for Addressing Identity Theft and Cheating in Electronic Examinations using Mouse Dynamics | Baba, meshach; Yisa, victor |
2019 | Towards a Digital Policing in Developing Nations: The Nigerian Context | Ismaila, Idris; Yisa, Victor; Ikuesan, Richard; Shakah, Imavah |
2018-06 | A DIAGNOSIS SYSTEM FOR LASSA FEVER AND RELATED AILMENTS USING FUZZY LOGIC | Aminu, Enesi Femi; Abiodun, Ahmed Ajani; Isah, Omeiza Rabiu; Anda, Ilyasu; Isah, Abdulkadir Onivehu; Zubairu, Hussaini Abubakar |
2017 | Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit | Subairu, S. O.; Isah, Abdulkadir Onivehu; Alhassan, J. K. |
2017 | Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on Transition | Isah, Abdulkadir Onivehu; Alhassan, J. K; Olanrewaju, S. S; Aminu, Enesi Femi |
2013-11 | Design and Construction of Wireless Personal Computer based Fuel Level Monitoring System | Tola, O. J.; Ambafi, A. J.; Isah, Abdulkadir Onivehu; Inyang, E.O |
Collection's Items (Sorted by Submit Date in Descending order): 81 to 100 of 236