Browsing by Author Ismaila, Idris

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 72 to 91 of 102 < previous   next >
Issue DateTitleAuthor(s)
2019-12Random Forest Based Hypertext Transfer Protocol Distributed Denial of Service Attack Detection System for Cloud Computing EnvironmentMorufu, Olalere; Rukayya, Umar; Juliana, Ndunagu; Ismaila, Idris; Raji, Abdullahi Egigogo; Suleiman, Muhammad Nasir
2018-03-20Secure Electronic Medical Records Transmission in Audio using NTRU Cryptosystem with Least Significant Bit Steganographic TechniqueAbdulkadir, Adamu; Abdulhamid, Shafi’i Muhammad; Oluwafemi, Osho; John, K. Alhassan; Ismaila, Idris
2018-12Secure Electronic Medical Records Transmission using NTRU Cryptosystem and LSB in Audio SteganographyAdamu, Abdulkadir; Shafi’i, Muhammad Abdulhamid; Oluwafem, Osho; Ismaila, Idris; John, K Alhassan
2016-11A Secure Method to Hide Confidential Data Using Cryptography and SteganographyAlhassan, J. K.; Ismaila, Idris; Waziri, Victor O.; Abdulkadir, Adamu
2016-11-28A Secure Method to Hide Confidential Data Using Cryptography and SteganographyJohn K., Alhassan; Ismaila, Idris; Victor. O, Waziri; Adamu, Abdulkadir
2019-03-19Secure University Network Architecture, Vulnerabilities, Risk Priority Level Classification and CountermeasuresIsmaila, Idris; Majigi, Muhammad Umar; Abdulhamid, Shafi’I Muhammad; Morufu, Olalere; Abdullahi, Muhammad Bashir; Nwaoch, Vivian O.
2019-03Secure University Network Architecture, Vulnerabilities, Risk Priority Level Classification And CountermeasuresIsmaila, Idris; Muhammad, Umar Majigi; Shafi'i, Muhammad Abdulhamid; Morufu, Olalere; Muhammad, Bashir Abdullahi; Vivian, O. Nwaocha
2016-11Securing File on Cloud Computing System using Encryption Software: A Comparative AnalysisWaziri, Victor O.; Alhassan, J. K.; Ismaila, Idris; Raji, Abdullahi Egigogo
2016-11-28Securing File on Cloud Computing System using Encryption Software: A Comparative AnalysisVictor, O. Waziri; John, K. Alhassan; Ismaila, Idris; Raji, Abdullahi Egigogo
2011Security Application in Bluetooth TechnologyOlalere, Morufu; Ismaila, Idris
2011-08Security Application In Bluetooth TechnologyIsmaila, Idris; Morufu, O.
2018Security Risk Analysis and Management in Electronic Payment Switching System in Nigeria, eTranzact International Plc. as a Case StudyAdeleke Jimoh, Ilyas; Ojeniyi . A, Joseph; Ismaila, Idris
2018-11Security Risk Analysis and Management in Online Retailing Transactions, using Konga as a case studyJoshua, Edward Mamza; Ismaila, Idris; Joseph, A.Ojeniyi; Shafii, M. Abdulhamid
2016-11-28SIM Cards Forensic Capability and Evaluation of Extraction ToolsIsmaila, Idris; John, K. Alhassan; Victor, O. Wa; Muhammad, Umar Majigi
2019-06-30Smart Financial Fraud Detection and Customer risk Profilling in Finalcial Institutions to Identify Potential Criminals using Genetic Markov AlgorithmIdris, Muhammad S.; Ismaila, Idris
2015A Swarm Negative Selection Algorithm for Email Spam DetectionIsmaila, Idris; Ali, Selamat
2023-04-04Systematic Literature Review and Metadata Analysis of Insider Threat Detection MechanismIsmaila, Idris; Adeleke, Nafisa Damilola
2023-03-22Systematic Literature Review on Android Malware DetectionAnyaora, Peter C.; Adebayo, Olawale Surajudeen; Ismaila, Idris; Ojeniyi, Joseph; Olalere, Morufu
2023-03-22Systematic Literature Review on Application Program Interface based Android Malware DetectionEhoda, Emmanuel; Adebayo, Olawale Surajudeen; Ismaila, Idris; Ojeniyi, Joseph; Olalere, Morufu
2014-12Tasks scheduling technique using league championship Algorithm for makespan minimization in iaas cloudShafi’i, Muhammad Abdulhamid; Muhammad, Shafie Abd Latiff; Ismaila, Idris