Search


Current filters:
Start a new search
Add filters:

Use filters to refine the search results.


Results 1-10 of 15 (Search time: 0.005 seconds).
Item hits:
Issue DateTitleAuthor(s)
2019Phishing Attack Detection Based on Random Forest with Wrapper Feature Selection MethodAbdulrahman, Musbau Dogo; Alhassan, John K; Adebayo, Olawale Surajudeen; Ojeniyi, Joseph Adebayo; Olalere, Morufu
2018Security Risk Analysis and Management in GSM Operations Using MTN as a Case StudyNdatsu, Zainab; Adebayo, Olawale Surajudeen; Ojeniyi, Joseph Adebayo
2012Information Security on the Communication Net- work in Nigeria Based on Digital SignatureAdebayo, Olawale Sirajudeen; Waziri, Victor O.; Ojeniyi, Joseph Adebayo; Bashir, Sulaimon Adebayo
2012information security on the communication network in Nigeria based on digital SignatureAdebayo, OS; Waziri, VO; Ojeniyi, Joseph Adebayo; Bashir, SA; Mishra, A
2013Network Security in Cloud Computing with Elliptic Curve CryptographyWaziri, V. O.; Ojeniyi, Joseph Adebayo; Hakimi, D; Audu, I; Abubakar, S.M.; Abdullahi, M. B.
2015Organizational Attendance Record System: Fraud and A Proposed Facial Recognition TechniqueOlalere, M; Ojeniyi, Joseph Adebayo; Osho, F; Ugwu, J.N.
2018Security Risk Analysis and Management in mobile wallet transaction: A Case study of Pagatech Nigeria LimitedAbdulrahamn, M. D.; Alhassan, J. K.; Ojeniyi, Joseph Adebayo; Abdulhamid, S. M.
2018Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature TechniquesOjeniyi, Joseph Adebayo; Adedayo, B. O.; Ismaila, I; Shafii, A. M.
2018A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection AttackOlalere, M; Egigogo, R. A.; Ojeniyi, Joseph Adebayo; Idris, I; Jimoh, R. G.
2018Security Risk Analysis and Management in Online Retailing Transactions, using Konga as a case studyEdward, J. M.; Idris, I; Ojeniyi, Joseph Adebayo; Abdulhamid, S. M.