Browsing by Author Abdulhamid, Shafi’i Muhammad

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 50 to 69 of 79 < previous   next >
Issue DateTitleAuthor(s)
2018-04-03Progress on Artificial Neural Networksfor Big Data Analytics: A SurveyChiroma, Haruna; Abdullahi, Usman Ali; Abdulhamid, Shafi’i Muhammad
2013The Prospects for e-Examinations in Nigeria and AustraliaAdebayo, Olawale Surajudeen; Abdulhamid, Shafi’i Muhammad; Fluck, Andrew
2017-06-20Protecting the CoreOluwafemi, Osho; Joseph, A. Ojeniyi; Abdulhamid, Shafi’i Muhammad
2016-02-13Recent Advancements in Resource Allocation Techniques for CloudMadni, Syed Hamid Hussain; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i Muhammad
2016-03-01Resource Scheduling for Infrastructure as a Service (IaaS) in Cloud Computing: Challenges and OpportunitiesMadni, Syed Hamid Hussain; Abdulhamid, Shafi’i Muhammad; Yahaya, Coulibaly; Abdulhamid, Shafi’i Muhammad
2020-03-02A Review of Detection Methodologies for Quick Response code Phishing AttacksSikiru, Subairu; John, Alhassan; Abdulhamid, Shafi’i Muhammad; Ojeniyi, Joseph
2008-08-02A review of intrution detection system architectures in mobile ad hoc networksAbdulhamid, Shafi’i Muhammad
2017-06-04A Review on Mobile SMS Spam Filtering TechniquesAbdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Chiroma, Haruna; Osho, Oluwafemi; Abdul-Salaam, Gaddafi; Abubakar, Adamu I.; Herawan, Tutut
2014-09-06Scheduling Techniques in on-Demand Grid as a Service Cloud: A ReviewAbdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Bashir, Mohammed Bakri
2017-06-07Secure e-examination systems compared: Case studies from two countriesFluck, Andrew; Adebayo, Olawale S.; Abdulhamid, Shafi’i Muhammad
2018-03-20Secure Electronic Medical Records Transmission in Audio using NTRU Cryptosystem with Least Significant Bit Steganographic TechniqueAbdulkadir, Adamu; Abdulhamid, Shafi’i Muhammad; Oluwafemi, Osho; John, K. Alhassan; Ismaila, Idris
2019-07-20Security Risk Analysis and Management in Banking Sector: A Case Study of a Selected Commercial Bank in NigeriaGana, Noah N.; Abdulhamid, Shafi’i Muhammad; Ojeniyi, Joseph A.
2019-05-12Security Challenges in Fog Computing Environment: A Systematic Appraisal of Current DevelopmentsYakubu, Jimoh; Abdulhamid, Shafi’i Muhammad; Christopher, Haruna Atabo; Chiroma, Haruna; Abdullahi, Mohammed
2019-07-13Security Risk Analysis and Management in a Non-Interest Banking SectorJoseph, A. Ojeniyi; Samuel, A. Oyeniyi; Abdulhamid, Shafi’i Muhammad
2018-07-02Security Risk Analysis and Management in mobile wallet transaction: A Case study of Pagatech Nigeria LimitedAbdulrahaman, Musbau D.; Alhassan, John K.; Ojeniyi, Joseph A.; Abdulhamid, Shafi’i Muhammad
2019-01-13Security Risk Analysis in Online Banking Transactions: Using Diamond Bank as a Case StudyJoseph, Ojeniyi; Edward, Elizabeth O.; Abdulhamid, Shafi’i Muhammad
2012-08-20The Simulation of Path Control and Route Redistribution Techniques on the Integration of WANs with Different Routing ProtocolsAbdulhamid, Shafi’i Muhammad; Baba, M; Yisa, V.L.; Njoku, C.O.
2019-03-12Sinkhole attack detection in a wireless sensor networks using enhanced ant colony optimization to improve detection rateNwankwo, Kenneth E.; Abdulhamid, Shafi’i Muhammad
2020-07-02Smart Home Automation System Using ZigBee, Bluetooth and Arduino TechnologiesTaiwo, O.,; Ezugwu, A. E.,; Rana, N.; Abdulhamid, Shafi’i Muhammad
2018-03-06A Soft Computing Approach to Detecting E-Banking Phishing Websites using Artificial Neural Network with Confusion MatrixAbdulhamid, Shafi’i Muhammad; Usman, Mubaraq Olamide; Ojerinde, Oluwaseun A.; Victor Ndako, Adama; Alhassan, John K