Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 137
Issue Date | Title | Author(s) |
2021-12-06 | Online Examination Proctoring for Quality Assurance in the Post COVID-19 Pandemic New Normal | Jubril, Abdullah Monday; Adebayo, Olawale Surajudeen; Achimugu, Philips; Abah, Joshua; Egwu, Samuel |
2018-10-24 | Risk Analysis and Management In Airline Transportation Using Jumia Air Travel As A Case | Gadzama, Emmanuel Hamman; Adebayo, Olawale Surajudeen; Ojeniyi, Joseph; Abdulhamid, Shafii Muhammad |
2023-03-22 | Hate and Offensive Speech Detection Using Term Frequency-Inverse Document Frequency (TF-IDF) and Majority Voting Ensemble Machine Learning Algorithms | Okechukwu, Chukwuemeka; Ismaila, Idris; Ojeniyi, Joseph; Olalere, Morufu; Adebayo, Olawale Surajudeen |
2023-03-22 | Systematic Literature Review on Android Malware Detection | Anyaora, Peter C.; Adebayo, Olawale Surajudeen; Ismaila, Idris; Ojeniyi, Joseph; Olalere, Morufu |
2023-03-22 | Systematic Literature Review on Application Program Interface based Android Malware Detection | Ehoda, Emmanuel; Adebayo, Olawale Surajudeen; Ismaila, Idris; Ojeniyi, Joseph; Olalere, Morufu |
2023-03-22 | Cloud Data Security Audit Report Techniques Using Bat Inspired Algorithm (CDSART-BA): A Review | Abdulkarim, Onuja M.; Adebayo, Olawale Surajudeen; Aliyu, Hamzat Olanrewaju; Olalere, Morufu |
2023-03-22 | Two-layer Secured Graphical Authentication with One Time Password (OTP) Verification for a Web Based Applications | Adebayo, Olawale Surajudeen; Ganiyu, Shefiu Olusegun; Alli, Adam A; Rufai, Salihu Ahmed; Jubril, Abdullahi Monday; Abdulazeez, Lateefah; Gadzama, Emmanuel Hamman |
2023-03-22 | Cyber-attacks and Impacts on the Educational Cyber Infrastructures | Adebayo, Olawale Surajudeen |
2022-08-26 | Systematic Review of Session Hijacking Attacks on 5G Network | Abdulkarim, Muhammad Kabir; Adebayo, Olawale Surajudeen; Abdulhamid, Shafii Muhammad; Bashir, Sulaimon Adebayo |
2022-12 | Android malware detection: A systematic Literature review | Ojeniyi, Joseph Adebayo; Hussaini, Y.; Umar, M.; Abdullazeez, A.; Oladipupo, S.F. |
2018 | A Genetically Optimized Model in Determining Applications for Desired Stream Ciphers | Edward, J. M.; Alhassan, J. K.; Ojeniyi, Joseph Adebayo |
2916 | Development of a Traffic Analyzer for the Detection of DDoS Attack Source | Ojeniyi, Joseph Adebayo; Balogun, M.O.; Fasola, S; Ugochukwu, O |
2014 | Improved Data Security Framework Based on Advanced Encryption Standard and Fingerprint | Ojeniyi, Joseph Adebayo; Waziri, V.O.; Idris, S |
2014 | A Simple Encryption and Decryption System. | Osho, O.; Zubair, Y.O.; Ojeniyi, Joseph Adebayo |
2017 | Protecting the Core | Osho, O.; Ojeniyi, Joseph Adebayo; Abdulhmid, S. M. |
2021 | An Intelligent Model for Detecting the Sensitivity Sentiments in Learners’ Profile on Learning Management System | Muhammad, M.K.; Ishaq, O. O.; Olayemi, M. O.; Ojeniyi, Joseph Adebayo |
2019-07 | Security Risk Analysis and Management in a Non-Interest Banking Sector | Ojeniyi, Joseph Adebayo; Samuel, A.O.; Abdulhmid, S. M. |
2018 | Quantum Cryptography – Currend Methods and Technology | Gadzama, E.H.; Adebayo, O.S.; Ojeniyi, Joseph Adebayo |
2015 | Enhanced information hiding using symmetric encryption techniques and least significant bits steganographic design approach | Ojeniyi, Joseph Adebayo; Adeniji, A.B.; Idris, S.; Ganiyu, S. O.; Alabi, I. O. |
2021 | Privacy Preservation in Mobile-Based Learning Systems: Current Trends, Methodologies, Challenges, Opportunities and Future Direction | Muhammad, M.K; Oyefolahan, I.O.; Olaniyi, O.M.; Ojeniyi, Joseph Adebayo |
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 137