Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Author
Title
Subject
Help
Sign on to:
My DSpace
Receive email
updates
Edit Profile
FUTMinna Institutional Repository
Search
Search:
All of DSpace
Conference Papers
SCHOOL OF INFORMATION AND COMMUNICATION TECHNOLOGY (SICT)
Cyber Security Science
for
Current filters:
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Start a new search
Add filters:
Use filters to refine the search results.
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Results 41-50 of 143 (Search time: 0.005 seconds).
previous
1
...
2
3
4
5
6
7
8
...
15
next
Item hits:
Issue Date
Title
Author(s)
2016
Real-Time Malware Uniform Resource Locator Detection: Identification of Novel Discriminative Features through Manual Examination and Empirical Analysis
Olalere, Morufu
;
Abdullah, Mohd Taufik
;
Mahmod, Ramlan
;
Abdullah, Azizol
2016
Network System Design for Combating Cybercrime in Nigeria
Isah, Abdulkadir Onivehu
;
Alhassan, J. K.
;
Sanjay, Misra
;
Idris, I
;
Crawford, Broderick
;
Soto, Ricardo
2020-12-29
Integrity Assurance for Small Scale Digital Devices Based Evidence for Cyber Crime Investigation
Muhammad, M. K.
;
Ismaila, Idris
;
Lukman, I.
2020-11-24
A Review of Detection Methodologies for Quick Response code Phishing Attacks
Subairu, S.O
;
Alhassan, J.K
;
Abdulhamid, S.M
;
Ojeniyi, J.A
2017-10
Mitigation of Sybil Attack on A Campus Network (CANET) Using Inter-Arrival Time Threshold and Physical Address Comparison
Victor, Onomza Waziri
;
Morufu, Olalere
;
Shafi’i, Muhammad A.
;
Ismaila, Idris
2011-12-14
Negative Selection Algorithm In Artificial Immune System For Spam Detection
Ismaila, Idris
;
Ali, Selamat
2021
Sooner Lightweight cryptosystem: Towards Privacy Preservation of Resource-Constrained Devices
Alfa, Abraham Ayegba
;
Alhassan, John Kolo
;
Olaniyi, Olayemi Mikail
;
Olalere, Morufu
2020
Analysis and Comparison of Key Revocation Protocols in Wireless Sensor Network
Taofeek, Yusuf
;
Waziri, Victor Onomza
;
Abdullahi, Bashir Mohammed
;
Olalere, Morufu
2019
Investigation of Vulnerability of Oil and Gas Critical Infrastructures and Developing a tracking Algorithm to track malicious attacks on the streams
Isah, Abdulkadir Onivehu
;
Alhassan, J. K.
;
Idris, I.
;
Adebayo, O. S.
;
Onuja, A. M.
2017
The Imperatives of Electrical Redundancy and Contingency Design for Critical Sections in a University Power Supply Network
Isah, Abdulkadir Onivehu
;
Alhassan, J. K.
;
Subairu, S. O.
;
Tola, O. J.
;
Ambafi, J. G.
Discover
Author
25
Ojeniyi, Joseph Adebayo
25
Olalere, Morufu
22
Abdulhamid, Shafi’i Muhammad
22
Adebayo, Olawale Surajudeen
15
Ismaila, Idris
8
Isah, Abdulkadir Onivehu
7
Ahmad, Suleiman
7
Alhassan, J. K.
6
Adebayo, O. S.
6
Alhassan, J.K
.
next >
Subject
7
Security
6
Detection
5
Cryptography
4
Cloud computing
4
Cybercrime
4
Machine Learning
3
Authentication
3
Blockchain
3
Cryptocurrency
3
cyber security
.
next >
Date issued
56
2020 - 2024
86
2010 - 2019
1
2008 - 2009
Has File(s)
143
true