Cyber Security Science : [144] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 144
Issue DateTitleAuthor(s)
2014A Simple Encryption and Decryption System.Osho, O.; Zubair, Y.O.; Ojeniyi, Joseph Adebayo
2017Protecting the CoreOsho, O.; Ojeniyi, Joseph Adebayo; Abdulhmid, S. M.
2021An Intelligent Model for Detecting the Sensitivity Sentiments in Learners’ Profile on Learning Management SystemMuhammad, M.K.; Ishaq, O. O.; Olayemi, M. O.; Ojeniyi, Joseph Adebayo
2019-07Security Risk Analysis and Management in a Non-Interest Banking SectorOjeniyi, Joseph Adebayo; Samuel, A.O.; Abdulhmid, S. M.
2018Quantum Cryptography – Currend Methods and TechnologyGadzama, E.H.; Adebayo, O.S.; Ojeniyi, Joseph Adebayo
2015Enhanced information hiding using symmetric encryption techniques and least significant bits steganographic design approachOjeniyi, Joseph Adebayo; Adeniji, A.B.; Idris, S.; Ganiyu, S. O.; Alabi, I. O.
2021Privacy Preservation in Mobile-Based Learning Systems: Current Trends, Methodologies, Challenges, Opportunities and Future DirectionMuhammad, M.K; Oyefolahan, I.O.; Olaniyi, O.M.; Ojeniyi, Joseph Adebayo
2020Recognition Based Graphical Password Algorithms: A SurveyKaka, J. G.; Ishaq, O. O.; Ojeniyi, Joseph Adebayo
2020Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin transactionsNoel, M. D.; Waziri, V.O.; Abdulhmid, S. M.; Ojeniyi, Joseph Adebayo; Okoro, M.U.
2020A Review of DNA Cryptographic ApproachesIliyasu, M.A.; Abisoye, O.A.; Bashir, S.A.; Ojeniyi, Joseph Adebayo
2020A Review of Detection Methodologies for Quick Response code Phishing AttacksSubairu, S; Alhassan, J.K.; Abdulhmid, S. M.; Ojeniyi, Joseph Adebayo
2019A SYSTEMATIC LITERATURE REVIEW ON DIGITAL EVIDENCE ADMISSIBILITY: METHODOLOGIES, CHALLENGES AND RESEARCH DIRECTIONSEdward, E.O.; Ojeniyi, Joseph Adebayo
2019Stateful Hash-based Digital Signature Schemes for Bitcoin CryptocurrencyNoel, M.D.; Waziri, V.O.; Abdulhmid, S. M.; Ojeniyi, Joseph Adebayo
2019Effective Policing Apparatus in Nigeria: The Place of Forensic SoundnessAlhassan, J.K.; Muhammed, A.A.; Iwokhagh, N.; Aibinu, A.M.; Ojeniyi, Joseph Adebayo
2018Risk Analysis and Management in Airline Transportation Using Jumia Air Travel as a Case StuGadzama, E.H.; Adedayo, O.S.; Ojeniyi, Joseph Adebayo; Abdulhamid, S. M.
2016Integrity-Based Evaluation of Forensic Tools on Android Jelly BeansOjeniyi, Joseph Adebayo; Alhassan, J. K.; Ojerinde, O.A.; Ahmad, S; Okeke, O.C.; Ojeniyi, A.A.
2015Digital Forensic Analysis for Enhancing Information SecurityOjeniyi, Joseph Adebayo; Idris, S; Abdulmalik, Y. A.; Ganiyu, S. O.; Alabi, I. O.
2020-05Identification of Best Machine Learning Algorithms for Detection of HTTP Botnet AttackOlalere, M; Yisa, R. N.; Ojeniyi, Joseph Adebayo; Nwaocha, V. O.
2019Phishing attack detection based on random forest with wrapper feature selection methodAbdulrahamn, M.D.; Alhassan, J. K.; Adebayo, O. S.; Ojeniyi, Joseph Adebayo; Olalere, M
2018A FRAMEWORK FOR PHYSICAL HOME SECURITY USING MOBILE INTRUSION DETECTION SYSTEMGaniyu, S.O.; Ismail, A; Ojeniyi, Joseph Adebayo; Adediran, T
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 144