Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 231
Issue Date | Title | Author(s) |
2012-06 | CRYPTOGRAPHIC MODELING IN SERVICE LEVEL AGREEMENT | Ahmad, Suleiman |
2024-02-08 | Enhancing Fast Fourier Transform Algorithm for Keystroke Acoustic Emanation Denoising Strategy on Real-Time Scenario | Ahmad, Suleiman; Alhassan, John Kolo; Abdulhamid, Shafi'i Muhammad; Zubair, Suleiman |
2022-12 | An Internet of Things (IoT)-based Veterinary Support System for Livestock Skin Disease Health Care using MobileNetV2 | Maliki, Danlami; Ibrahin, Aliyu; Jinsul, Kim; Emmanuel, Fiyinfoluwa Ogunbase; Ahmad, Suleiman; Ibrahim, Mohammed Abdullahi |
2013 | Design and Construction of a Simple Microcontroller Based Conference Electronic Voting Machine with Digital Displa | Ahmad, Suleiman; Zubair, Suleiman; Abdulazeez, Hassan T.; Salihu, B. A.; Salihu, Y. |
2012-02-02 | Investigating the Potential of Wind as a Recovery Improvement of Building Integrated Photovoltaic’s Tiled Roof Using Indoor Solar Simulator | Mambo, Abdulhamid. D; Zubair, Suleiman.; Abdulazeez, Hassan. T; Ahmad, Suleiman |
2012-02-16 | Effect of network hierarchy in a typical campus area network (CAN) of a university | Zubair, Suleiman; Adediran, Y. A.; Misra, Sanjay.; Salihu, B. A.; Abdulazeez, Hassan. T.; Ahmad, Suleiman |
2011 | Privacy and National Security Issues in Social Networks: The Challenges | Abdulhamid, Shafi'i Muhammad; Ahmad, Suleiman; Waziri, Victor Onomza; Jibril, Fatima N. |
2011-08-10 | Design and construction of a microcontroller based single axis solar tracker | Zubair, Suleiman; Ahmad, Suleiman; Abdulazeez, Hassan T.; Salihu, B. A. |
2023-12-01 | A Comparative Experimental Evaluation of Antimalware Tools on Android Mobile Device | S. O Subairu, S. A. Gbadamosi |
2023 | Modeling DDOS attacks in sdn and detection using random forest classifier | Abdullahi Wabi, Aishatu; Idris, Ismaila; Olaniyi, Olayemi Mikail; Ojeniyi, Joseph Adebayo; Adebayo, Olawale Surajudeen |
2023 | Blockchain Based Zero Knowledge Proof Model for Secure Data Sharing Scheme in a Distributed Vehicular Networks | Mohammad, Umar Majigi; Ismaila, Idris; Shafii, M. Abdulhamid; Richard, Adeyemi Ikuesan |
2023-05 | Application of Machine Learning Algorithm for Classification of Fake COVID-19 Tweets | Malomo, O. S.; Uduimoh, A. A.; Alhassan, J.K. |
2023-05-11 | Design Framework of Cyber Security Solutions to Threats and Attacks on Critical Infrastructure of Electricity Power Systems of Nigeria Companies | Ismaila, Idris; Ilyas, Adeleke; Andrew, Anogie Uduimoh; Joshua, J. Tom |
2019-06-11 | Forensic Analysis of Mobile Banking Applications in Nigeria | Uduimoh, A. A.; Ismaila, I.; Osho, O; Abdulhamid, S.M |
2023 | Design Framework of Cyber Security Solutions to Threats and Attacks on Critical Infrastructure of Electricity Power Systems of Nigeria Companies. | Ismaila, Idris; ilyas, Adeleke; Andrew, Anogie Uduimoh; Joshua, j. Tom |
2023-04-04 | Systematic Literature Review and Metadata Analysis of Insider Threat Detection Mechanism | Ismaila, Idris; Adeleke, Nafisa Damilola |
2023-03-14 | Impact Analysis and Features for DDOS Attacks Detection in SDN | Abdullahi, Aishatu Wabi; Ismaila, Idris; Olayemi, Mikail Olaniyi; Joseph, A. Ojeniyi |
2014 | Assessment of Information Security Awareness among Online Banking Costumers in Nigeria | Olalere, Morufu; Waziri, Onomza Victor; Ismaila, Idris; Adebayo, Olawale Surajudeen; Ololade, O |
2020-09-10 | Improved Genetically Optimized Neural Network Algorithm for the Classification of Distributed Denial of Service Attack | Gadzama, Emmanuel Hamman; Adebayo, Olawale Surajudeen |
2021-08-20 | Convolutional neural network-based approach for dermatological disease prediction | Afiz, Adeniyi; Bashir, Sulaimon Adebayo; Adebayo, Olawale Surajudeen; Ganiyu, Shefiu Olusegun |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 231