Search


Current filters:


Start a new search
Add filters:

Use filters to refine the search results.


Results 1-10 of 11 (Search time: 0.003 seconds).
Item hits:
Issue DateTitleAuthor(s)
2018Detection of a Real - time Cyber- attack using Locator Agent AlgorithmIsah, O. A.; Alhassan, John K; Ismaila, Idris; Adebayo, Olawale Surajudeen
2017Comparative Analysis of the Accuracy of Forensic Results obtained from Window and Android PlatformsAlhassan, John K; Abdulazeez, Hassan T; Abdulhamid, Shafii Muhammad; Ahmad, Suleiman; Adebayo, Olawale Surajudeen
2017FORENSIC ANALYSIS OF KIK MESSENGER ON ANDROID DEVICESAdebayo, Olawale Surajudeen; Sulaimon, Salamotu Aliyu; Osho, Oluwafemi; Abdulhamid, Shafii Muhammad
2018-04Performance Analysis of Classification Algorithms for DDoS Attack Detection in a Distributed Network Environment. , 24th – 27th April, 2018. Baze University AbujaAdebayo, Olawale Surajudeen; Noel, M. D; Abdulmutalab, M.; Baba, Mesach; Abdulhamid, Shafi’í Muhammad; Suleiman, Ahmad
2019Fully Homomorphic Encryption: An Antidote to Cloud Data Security and Privacy ConcernsAbdullah, Monday Jubrin; Ikechukwu, Izeagbu; Adebayo, Olawale Surajudeen
2014Android Malware Classification Using Static Code Analysis and Apriori Algorithm Improved with particle swarm optimizationAdebayo, Olawale Surajudeen; Normaziah, Abdul Aziz
2014An Intelligence based Model for the Prevention of Advanced Cyber-attacksAdebayo, Olawale Surajudeen; Normaziah, Abdul Aziz
2014Techniques for Analysing Android MalwareAdebayo, Olawale Surajudeen; Normaziah, Abdul Aziz
2018-12Quantum Cryptography – Currend Methods and Technology. 11th – 13th December, 2018Gadzama, Emmanuel H; Adebayo, Olawale Surajudeen; Ojeniyi, Joseph A.
2019-09Investigation of Vulnerability of Oil and Gas Critical Infrastructures and Developing a Tracking Algorithm to track Malicious Attacks on the StreamsIsah, Abdulkadir O.; Alhassan, John K; Ismaila, Idris; Adebayo, Olawale Surajudeen; Onuja, Abdulkadir S.