Browsing by Author Ismaila, Idris

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 66 to 85 of 102 < previous   next >
Issue DateTitleAuthor(s)
2012Optimized Spam Classification Approach with Negative Selection AlgorithmIsmaila, Idris; Ali, Selamat
2019Performance Evaluation of Machine Learning Algorithms for Hypertext Transfer Protocol Distributed Denial of Service Intrusion DetectionRukayya, Umar; Morufu, Olalere; Ismaila, Idris; Raji, Abdullahi Egigogo; Bolarin, G
2015Plastic Financial Fraud in the Most Populated Black Africa; Nigeria: The Mitigation Based-On One-Time PasswordWaziri, Victor Onomza; Alhassan, J. K.; Ismaila, Idris; Tunde, Abdulrahman
2015-02Plastic Financial Fraud In The Most Populated Black Africa; Nigeria:The Mitigation Based-On One-Time PasswordWaziri, Victor Onomza; John, Alhassan; Ismaila, Idris; Abdulrahman, Tunde
2018-04Privacy Preserving Classification Over Encrypted Data Using Fully Homomorphic Encryption TechniqueAbdullahi, Monday Jubrin; Victor, Onomza Waziri; Muhammad, Bashir Abdullahi; Ismaila, Idris
2018-12A Proposed Model For Users’ Authentication Of Attendance System Towards Curtailing Fraud In Public SectorIsmaila, Idris; Ilyas, Adeleke Jimoh; Ishola, D. Muraina
2019-12Random Forest Based Hypertext Transfer Protocol Distributed Denial of Service Attack Detection System for Cloud Computing EnvironmentMorufu, Olalere; Rukayya, Umar; Juliana, Ndunagu; Ismaila, Idris; Raji, Abdullahi Egigogo; Suleiman, Muhammad Nasir
2018-03-20Secure Electronic Medical Records Transmission in Audio using NTRU Cryptosystem with Least Significant Bit Steganographic TechniqueAbdulkadir, Adamu; Abdulhamid, Shafi’i Muhammad; Oluwafemi, Osho; John, K. Alhassan; Ismaila, Idris
2018-12Secure Electronic Medical Records Transmission using NTRU Cryptosystem and LSB in Audio SteganographyAdamu, Abdulkadir; Shafi’i, Muhammad Abdulhamid; Oluwafem, Osho; Ismaila, Idris; John, K Alhassan
2016-11A Secure Method to Hide Confidential Data Using Cryptography and SteganographyAlhassan, J. K.; Ismaila, Idris; Waziri, Victor O.; Abdulkadir, Adamu
2016-11-28A Secure Method to Hide Confidential Data Using Cryptography and SteganographyJohn K., Alhassan; Ismaila, Idris; Victor. O, Waziri; Adamu, Abdulkadir
2019-03-19Secure University Network Architecture, Vulnerabilities, Risk Priority Level Classification and CountermeasuresIsmaila, Idris; Majigi, Muhammad Umar; Abdulhamid, Shafi’I Muhammad; Morufu, Olalere; Abdullahi, Muhammad Bashir; Nwaoch, Vivian O.
2019-03Secure University Network Architecture, Vulnerabilities, Risk Priority Level Classification And CountermeasuresIsmaila, Idris; Muhammad, Umar Majigi; Shafi'i, Muhammad Abdulhamid; Morufu, Olalere; Muhammad, Bashir Abdullahi; Vivian, O. Nwaocha
2016-11Securing File on Cloud Computing System using Encryption Software: A Comparative AnalysisWaziri, Victor O.; Alhassan, J. K.; Ismaila, Idris; Raji, Abdullahi Egigogo
2016-11-28Securing File on Cloud Computing System using Encryption Software: A Comparative AnalysisVictor, O. Waziri; John, K. Alhassan; Ismaila, Idris; Raji, Abdullahi Egigogo
2011Security Application in Bluetooth TechnologyOlalere, Morufu; Ismaila, Idris
2011-08Security Application In Bluetooth TechnologyIsmaila, Idris; Morufu, O.
2018Security Risk Analysis and Management in Electronic Payment Switching System in Nigeria, eTranzact International Plc. as a Case StudyAdeleke Jimoh, Ilyas; Ojeniyi . A, Joseph; Ismaila, Idris
2018-11Security Risk Analysis and Management in Online Retailing Transactions, using Konga as a case studyJoshua, Edward Mamza; Ismaila, Idris; Joseph, A.Ojeniyi; Shafii, M. Abdulhamid
2016-11-28SIM Cards Forensic Capability and Evaluation of Extraction ToolsIsmaila, Idris; John, K. Alhassan; Victor, O. Wa; Muhammad, Umar Majigi