Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 137
Issue Date | Title | Author(s) |
2017-10-17 | Comparative Analysis of the Accuracy of Forensic Results obtained from Window and Android Platforms | Alhassan, John K.; Abdulazeez, Hassan T.; Ahmad, Suleiman; Abdulhamid, Shafi'i Muhammad; Adebayo, Olawale S. |
2023 | DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION TECHNIQUE BASE ON ARTIFICIAL NEUTRAL NETWORKS: SYSTEMATIC LITERATURE REVIEW | Abdul-karim Baba Oshoma; Morufu Olalere; Ismaila Idris; Joseph Adebayo Ojeniyi; Abdulkadir Onivehu Isah |
2023 | A SYSTEMATIC LITERATURE REVIEW OF CLOUD RADIO ACCESS NETWORK AND NETWORK SLICING TECHNOLOGY ON 5G | W. M Jonah; J. K. Alhassani; Ismaila Idris; J. A. Ojeniyi; O. S. Adebayo; A. O. Isah |
2023 | SYSTEMATIC LITERATURE REVIEW OF ATTACK ON MEDICAL CYBERPHYSICAL SYSTEMS (MCPS) | Michael, O. U.; Waziri, V. O.; Ismaila Idris.; Ojeniyi, J. A.,; Adebayo, O. S.; Isah, A. O. |
2024 | A Comprehensive Review on Techniques, Tools and Open Issue in Blockchain and Smart Contract Development | Hafiz O. Haruna; Ismaila Idris; Joseph Ojeniyi; Abdulkadir O. Isah; Sikiru O. Subaiyru |
2024 | A SYSTEMATIC LITERATURE REVIEW OF DIGITAL FORENSIC INVESTIGATION METHODOLOGIES: TRENDS, FRAMEWORKS, TECHNIQUES, CHALLENGES, SOLUTIONS AND OPEN ISSUES | Masu’d Balarabe; Ismaila Idris; Joseph Ojeniyi; Abdulkadir Onivehu Isah |
2022 | Cryptocurrency Fraud Detection: A systematic Literature review | Hussaini, Y,; Waziri, V.O.; Isah, A. O.; Ojeniyi, J A |
2019-07 | ICT ARCHITECTURE FOR NATIONAL SECURITY | Alabi, I. O; Ojeniyi, J. A; Ismail, A. A; Ahmad, Suleiman; Abdulazeez, Hassan T. |
2010-11-08 | Design of a Trapdoor for Password Access | Ahmad, Suleiman; Zubair, Suleiman.; Abdulazeez, Hassan. T; Salihu, Bala A.; Idris, L.; Ibrahim, A. |
2010-11-06 | Integrating OPNET IT Guru to Enhance Networking Education in Nigerian Universities. | Zubair, Suleiman; Ahmad, Suleiman.; Abdulazeez, Hassan. T; Salihu, Bala A. |
2023-04-08 | Cybersecurity Infrastructure Defense and Capacity Review for Nigeria with Digital Economy Impact | Ismaila, Idris, .; Uduimoh, Andrew Anogie; Omeiza, Haruna Hafiz |
2023-04-18 | Cybersecurity Infrastructure Defense and Capacity Review for Nigeria with Digital Economy Impact. | Ismaila, Idris; Andrew, Anogie Uduimoh; Hafiz, Omeiza Haruna |
2021 | Integration Of Consortium Blockchain Model In The Nigerian Banking Sector | Ojerinde, O. A.; Salawu, J.; A., Abisoye O.; A., Uduimoh, A. |
2019 | Forensic Analysis of Mobile Banking Apps | Osho, O.; Mohammed, U. L.; Nimzing, N. N.; Uduimoh, A. A; Misra, S |
2019-03-01 | Effective Policing Apparatus in Nigeria: The Place of Forensic Soundness | John, Alhassan,; Adamu, Muhammed; N, Iwokhagh; Musa, Aibinu; Joseph, Ojeniyi; A., Uduimoh |
2019 | AbsoluteSecure: A Tri-Layered Data Security System | Osho, O.; Musa, F. A.; Misra, S.; Uduimoh, A. A.; Adewunmi, A.; Ahuja, R. |
2022-11-01 | Ring Learning With Error-Based Encryption Scheme for the Privacy of Electronic Health Records Management | Abdulkadir, U; Waziri, V.O; Alhassan, J.K; Ismaila, I |
2023 | Systematic Literature Review on Android Malware Detection | Anyaora, P.C; Adebayo, O.S; Ismaila, I; Ojeniyi, J.A; Olalere, M |
2023 | Hate and Offensive Speech Detection Using Term Frequency- Inverse Document Frequency (TF-IDF) and Majority Voting Ensemble Machine Learning Algorithms | Okechukwu, C; Idris, I; Ojeniyi, J.A; Olalere, M; Adebayo, 0.S |
2023-03-23 | Systematic Literature Review on Application Program Interface based Android Malware Detection | Emmanuel, Ehoda; Olawale, Surajudeen Adebayo; Idris, Ismaila; Joseph, Ojeniyi; Morufu, Olalere |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 137