Browsing by Author Abdulhamid, Shafi’i Muhammad

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 52 to 71 of 78 < previous   next >
Issue DateTitleAuthor(s)
2016-02-13Recent Advancements in Resource Allocation Techniques for CloudMadni, Syed Hamid Hussain; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i Muhammad
2016-03-01Resource Scheduling for Infrastructure as a Service (IaaS) in Cloud Computing: Challenges and OpportunitiesMadni, Syed Hamid Hussain; Abdulhamid, Shafi’i Muhammad; Yahaya, Coulibaly; Abdulhamid, Shafi’i Muhammad
2020-03-02A Review of Detection Methodologies for Quick Response code Phishing AttacksSikiru, Subairu; John, Alhassan; Abdulhamid, Shafi’i Muhammad; Ojeniyi, Joseph
2008-08-02A review of intrution detection system architectures in mobile ad hoc networksAbdulhamid, Shafi’i Muhammad
2017-06-04A Review on Mobile SMS Spam Filtering TechniquesAbdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Chiroma, Haruna; Osho, Oluwafemi; Abdul-Salaam, Gaddafi; Abubakar, Adamu I.; Herawan, Tutut
2014-09-06Scheduling Techniques in on-Demand Grid as a Service Cloud: A ReviewAbdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Bashir, Mohammed Bakri
2017-06-07Secure e-examination systems compared: Case studies from two countriesFluck, Andrew; Adebayo, Olawale S.; Abdulhamid, Shafi’i Muhammad
2018-03-20Secure Electronic Medical Records Transmission in Audio using NTRU Cryptosystem with Least Significant Bit Steganographic TechniqueAbdulkadir, Adamu; Abdulhamid, Shafi’i Muhammad; Oluwafemi, Osho; John, K. Alhassan; Ismaila, Idris
2019-07-20Security Risk Analysis and Management in Banking Sector: A Case Study of a Selected Commercial Bank in NigeriaGana, Noah N.; Abdulhamid, Shafi’i Muhammad; Ojeniyi, Joseph A.
2019-05-12Security Challenges in Fog Computing Environment: A Systematic Appraisal of Current DevelopmentsYakubu, Jimoh; Abdulhamid, Shafi’i Muhammad; Christopher, Haruna Atabo; Chiroma, Haruna; Abdullahi, Mohammed
2019-07-13Security Risk Analysis and Management in a Non-Interest Banking SectorJoseph, A. Ojeniyi; Samuel, A. Oyeniyi; Abdulhamid, Shafi’i Muhammad
2018-07-02Security Risk Analysis and Management in mobile wallet transaction: A Case study of Pagatech Nigeria LimitedAbdulrahaman, Musbau D.; Alhassan, John K.; Ojeniyi, Joseph A.; Abdulhamid, Shafi’i Muhammad
2019-01-13Security Risk Analysis in Online Banking Transactions: Using Diamond Bank as a Case StudyJoseph, Ojeniyi; Edward, Elizabeth O.; Abdulhamid, Shafi’i Muhammad
2012-08-20The Simulation of Path Control and Route Redistribution Techniques on the Integration of WANs with Different Routing ProtocolsAbdulhamid, Shafi’i Muhammad; Baba, M; Yisa, V.L.; Njoku, C.O.
2019-03-12Sinkhole attack detection in a wireless sensor networks using enhanced ant colony optimization to improve detection rateNwankwo, Kenneth E.; Abdulhamid, Shafi’i Muhammad
2020-07-02Smart Home Automation System Using ZigBee, Bluetooth and Arduino TechnologiesTaiwo, O.,; Ezugwu, A. E.,; Rana, N.; Abdulhamid, Shafi’i Muhammad
2018-03-06A Soft Computing Approach to Detecting E-Banking Phishing Websites using Artificial Neural Network with Confusion MatrixAbdulhamid, Shafi’i Muhammad; Usman, Mubaraq Olamide; Ojerinde, Oluwaseun A.; Victor Ndako, Adama; Alhassan, John K
2019-07-04Stateful Hash-based Digital Signature Schemes for Bitcoin CryptocurrencyMoses, Noel Dogonyaro; Victor, Waziri Onomza; Abdulhamid, Shafi’i Muhammad; Joseph, Ojeniyi Adebayo
2012-07-20Steganography and Its Applications in Information Dessimilation on the Web Using Images as Security Embeddment: A Wavelet ApproachWaziri, Victor Onomza; Isah, Audu; Ochoche, Abraham; Abdulhamid, Shafi’i Muhammad
2016-09-20A Support Vector Machine Classification of Computational Capabilities of 3D Map on Mobile Device for Navigation Aid.Mantoro, Abubakar; Moedjiono, S; Chiroma, Haruna; Waqas, A; Abdulhamid, Shafi’i Muhammad; Hamza, M. F.; Gital, A