Collection's Items (Sorted by Submit Date in Descending order): 221 to 240 of 252
Issue Date | Title | Author(s) |
2019 | Development of a Secured E-Voting System With OTP as Second Order Authentication | Salam, H. J; Adebayo, O. S.; Isah, A. O.; Lawal, K. H; Alhassan, J. K. |
2019 | Ensemble Learning Approach for the Enhancement of Performance of Intrusion Detection System | Abdulrahaman, Musbau Dogo; Alhassan, J. K. |
2018 | Forecasting Reasons for Students’ Health Failure in Tertiary Institutions | Alhassan, J. K.; Adebanjo, S.; Sanjay, M.; Damaševičius, Robertas; Maskeliūnas, Rytis |
2018-12 | Security Risk Analysis and Management in mobile wallet transaction: A Case study of Pagatech Nigeria Limited | Abdulrahaman, Musbau D.; Alhassan, J. K.; Ojeniyi, Joseph A.; Abdulhamid, Shafii M. |
2018-01 | Comparative Analysis of Classification Algorithms for Email Spam Detection | Abdulhamid, Shafi’i Muhammad; Shuaib, Maryam; Osho, Oluwafemi; Ismaila, Idris; Alhassan, J. K. |
2017-06-29 | Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit | Subairu, S. O; Isah, A. O; Alhassan, J. K. |
2017-11 | Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on Transition | Isah, A. O.; Alhassan, J. K.; Olanrewaju, S. S; Aminu, Enesi Femi |
2017 | HTTP Flood Mitigation Using Gateway Inspection and Second Chance Approach Analysis | Idris, Ismaila; Ogidiagba, Jones Tobi; Waziri, Victor O.; Alhassan, J. K.; Ojeniyi, Joseph |
2017 | Classification of Crime Data for Crime Control Using C4.5 and Naïve Bayes Techniques | Obuandike, Georgina N.; Alhassan, J. K.; Abdullahi, M. B |
2017-05 | A Proposed Model for Dynamic Graphical Password Integration into ATM Authentication | Subairu, S. O.; Alhassan, J. K.; Waziri, V. O |
2016-11 | Evaluating Capabilities of Rootkits Tools. | Alhassan, J. K.; Subairu, S. O; Misra, S |
2016 | A Critical Analysis of Component-Based Software Engineering | Subairu, Sikiru Olanrewaju; Alhassan, J. K. |
2015-10 | A Decision Tree Approach for Predicting Students Academic Performance | Kolo, David Kolo; Adepoju, Solomon A.; Alhassan, J. K. |
2007 | An Evaluation of Internet Connectivity of Information Technology Firms in Minna Metropolis | Alhassan, J. K.; Adepoju, S. A. |
2015-12 | Analytical Study of Some Selected Classification Algorithms in WEKA Using Real Crime Data | Obuandike, Georgina N.,; Audu, Isah; Alhassan, J. K. |
2015-09 | Performance Analysis of Artificial Neural Network with Decision Tree in Prediction of Diabetes Mellitus | Alhassan, J. K.; Attah, B; Misra, S |
2015-07 | Using Data Mining Technique for Scholarship Disbursement | Alhassan, J. K.; Lawal, S. A. |
2015-05 | Factors Militating against Successful Implementation of Computer Studies in 9-Year Universal Basic Education (UBE) Programme | Suleiman, Garba; Adepoju, Solomon A.; Alhassan, J. K. |
2015-05 | Review of Software Reliability Analysis Models: A Case Study of Operating Systems | Abdullahi, Muhammed B; Alhassan, J. K.; Adepoju, Solomon; Adamu, Abubakar |
2015 | Plastic Financial Fraud in the Most Populated Black Africa; Nigeria: The Mitigation Based-On One-Time Password | Waziri, Victor Onomza; Alhassan, J. K.; Ismaila, Idris; Tunde, Abdulrahman |
Collection's Items (Sorted by Submit Date in Descending order): 221 to 240 of 252