Browsing by Author Abdulhamid, Shafi’i Muhammad

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 48 to 67 of 80 < previous   next >
Issue DateTitleAuthor(s)
2017-07-12Performance Comparison of Heuristic Algorithms for Task Scheduling in IaaS Cloud Computing EnvironmentMadni, Syed Hamid Hussain; Abd Latiff, Muhammad Shafie; Mohammed, Abdullahi; Ngadi, M. A.; Abdulhamid, Shafi’i Muhammad
2011-07-05Privacy and National Security Issues in Social Networks: The ChallengesAbdulhamid, Shafi’i Muhammad; Ahmad, Sulaiman; Waziri, Victor O.; Jibril, Fatima N.
2018-04-03Progress on Artificial Neural Networksfor Big Data Analytics: A SurveyChiroma, Haruna; Abdullahi, Usman Ali; Abdulhamid, Shafi’i Muhammad
2013The Prospects for e-Examinations in Nigeria and AustraliaAdebayo, Olawale Surajudeen; Abdulhamid, Shafi’i Muhammad; Fluck, Andrew
2017-06-20Protecting the CoreOluwafemi, Osho; Joseph, A. Ojeniyi; Abdulhamid, Shafi’i Muhammad
2016-02-13Recent Advancements in Resource Allocation Techniques for CloudMadni, Syed Hamid Hussain; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i Muhammad
2016-03-01Resource Scheduling for Infrastructure as a Service (IaaS) in Cloud Computing: Challenges and OpportunitiesMadni, Syed Hamid Hussain; Abdulhamid, Shafi’i Muhammad; Yahaya, Coulibaly; Abdulhamid, Shafi’i Muhammad
2020-03-02A Review of Detection Methodologies for Quick Response code Phishing AttacksSikiru, Subairu; John, Alhassan; Abdulhamid, Shafi’i Muhammad; Ojeniyi, Joseph
2008-08-02A review of intrution detection system architectures in mobile ad hoc networksAbdulhamid, Shafi’i Muhammad
2017-06-04A Review on Mobile SMS Spam Filtering TechniquesAbdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Chiroma, Haruna; Osho, Oluwafemi; Abdul-Salaam, Gaddafi; Abubakar, Adamu I.; Herawan, Tutut
2014-09-06Scheduling Techniques in on-Demand Grid as a Service Cloud: A ReviewAbdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Bashir, Mohammed Bakri
2017-06-07Secure e-examination systems compared: Case studies from two countriesFluck, Andrew; Adebayo, Olawale S.; Abdulhamid, Shafi’i Muhammad
2018-03-20Secure Electronic Medical Records Transmission in Audio using NTRU Cryptosystem with Least Significant Bit Steganographic TechniqueAbdulkadir, Adamu; Abdulhamid, Shafi’i Muhammad; Oluwafemi, Osho; John, K. Alhassan; Ismaila, Idris
2018-09Secure University Network Architecture, Vulnerabilities, Risk Priority Level Classification and CountermeasuresIsmaila, Idris; Majigi, Muhammad Umar; Abdulhamid, Shafi’i Muhammad; Olalere, Morufu; Abdullahi, Muhammad Bashir; Nwaocha, Vivian O.
2019-07-20Security Risk Analysis and Management in Banking Sector: A Case Study of a Selected Commercial Bank in NigeriaGana, Noah N.; Abdulhamid, Shafi’i Muhammad; Ojeniyi, Joseph A.
2019-05-12Security Challenges in Fog Computing Environment: A Systematic Appraisal of Current DevelopmentsYakubu, Jimoh; Abdulhamid, Shafi’i Muhammad; Christopher, Haruna Atabo; Chiroma, Haruna; Abdullahi, Mohammed
2019-07-13Security Risk Analysis and Management in a Non-Interest Banking SectorJoseph, A. Ojeniyi; Samuel, A. Oyeniyi; Abdulhamid, Shafi’i Muhammad
2018-07-02Security Risk Analysis and Management in mobile wallet transaction: A Case study of Pagatech Nigeria LimitedAbdulrahaman, Musbau D.; Alhassan, John K.; Ojeniyi, Joseph A.; Abdulhamid, Shafi’i Muhammad
2019-01-13Security Risk Analysis in Online Banking Transactions: Using Diamond Bank as a Case StudyJoseph, Ojeniyi; Edward, Elizabeth O.; Abdulhamid, Shafi’i Muhammad
2012-08-20The Simulation of Path Control and Route Redistribution Techniques on the Integration of WANs with Different Routing ProtocolsAbdulhamid, Shafi’i Muhammad; Baba, M; Yisa, V.L.; Njoku, C.O.