Search


Current filters:

Start a new search
Add filters:

Use filters to refine the search results.


Results 1-10 of 17 (Search time: 0.004 seconds).
Item hits:
Issue DateTitleAuthor(s)
2017-05A Proposed Model for Dynamic Graphical Password Integration into ATM AuthenticationSubairu, S. O.; Alhassan, J. K.; Waziri, V. O
2017-11Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on TransitionIsah, A. O.; Alhassan, J. K.; Olanrewaju, S. S; Aminu, Enesi Femi
2017-06-29Comparative Performance Study of Antimalware Tools on TDL-4 RootkitSubairu, S. O; Isah, A. O; Alhassan, J. K.
2017-07A Safety Data Model for data analysis and decision makingAnda, Ilyasu; Isah, Omeiza Rabiu; Aminu, Enesi Femi
2017Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on TransitionIsah, A. O.; Alhassan, J. K.; Olarewaju, S. S.; Aminu, Enesi Femi
2017-08Modeling and Analytical Simulation of High-Temperature Gas Filtration CombustionIBRAHIM, M.; OLAYIWOLA, R. O.; COLE, A. T; SHEHU, Muhammad D.; MUHAMMAD, Muhammad Kudu
2017A Framework for Unsupervised Change Detection in Activity RecognitionBashir, Sulaimon Adebayo; Doolan, Daniel; Petrovski, Andrei
2017Classification of Crime Data for Crime Control Using C4.5 and Naïve Bayes TechniquesObuandike, Georgina N.; Alhassan, J. K.; Abdullahi, M. B
2017HTTP Flood Mitigation Using Gateway Inspection and Second Chance Approach AnalysisIdris, Ismaila; Ogidiagba, Jones Tobi; Waziri, Victor O.; Alhassan, J. K.; Ojeniyi, Joseph
2017-04-04Parametric equation for capturing dynamics of cyber-attack malware transmission with mitigation on computer networkFalaye, A. A.,; Etuk, S. O.,; Ugwuoke, C. U.,; ADAMA, Victor Ndako; Olujimi, O.,; Seun, A.