Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Author
Title
Subject
Help
Sign on to:
My DSpace
Receive email
updates
Edit Profile
FUTMinna Institutional Repository
Search
Search:
All of DSpace
Journal Articles
SCHOOL OF INFORMATION AND COMMUNICATION TECHNOLOGY (SICT)
Cyber Security Science
for
Current filters:
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Start a new search
Add filters:
Use filters to refine the search results.
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Results 1-10 of 14 (Search time: 0.004 seconds).
previous
1
2
next
Item hits:
Issue Date
Title
Author(s)
2018
A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection Attack
Olalere, Morufu
;
Egigogo, Raji Abdullahi
;
Ojeniyi, Joseph A
;
Ismaila, Idris
;
Jimoh, Rasheed Gbenga
2018
Android Malware Classification using Whale Optimization Algorithm
Sulaimon, Salama A.
;
Adebayo, Olawale Surajudeen
;
Bashir, Sulaimon A.
;
Ismaila, Idris
2018-05-01
Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniques
Ojeniyi, Joseph A.
;
Adedayo, Bolaji O.
;
Ismaila, Idris
;
Abdulhamid, Shafi’i Muhammad
2018-12
Secure Electronic Medical Records Transmission using NTRU Cryptosystem and LSB in Audio Steganography
Adamu, Abdulkadir
;
Shafi’i, Muhammad Abdulhamid
;
Oluwafem, Osho
;
Ismaila, Idris
;
John, K Alhassan
2018
A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection Attack
Morufu, Olalere
;
Raji, Abdullahi Egigogo
;
Ojeniyi, Joseph A.
;
Ismaila, Idris
;
Rasheed, Gbenga Jimoh
2018-04
Privacy Preserving Classification Over Encrypted Data Using Fully Homomorphic Encryption Technique
Abdullahi, Monday Jubrin
;
Victor, Onomza Waziri
;
Muhammad, Bashir Abdullahi
;
Ismaila, Idris
2018-11
Security Risk Analysis and Management in Online Retailing Transactions, using Konga as a case study
Joshua, Edward Mamza
;
Ismaila, Idris
;
Joseph, A.Ojeniyi
;
Shafii, M. Abdulhamid
2018
A Forensic Evidence Recovery from Mobile Device Applications
John K., Alhassan
;
Agbejule, Gbolahan
;
Ismaila, Idris
;
Mohammed Abdulhamid, Shafii
;
Victor O., Onomza
2018
Security Risk Analysis and Management in Electronic Payment Switching System in Nigeria, eTranzact International Plc. as a Case Study
Adeleke Jimoh, Ilyas
;
Ojeniyi . A, Joseph
;
Ismaila, Idris
2018-07
Android malware classification using whale optimization algorithm
Sulaiman, Salamatu Aliyu
;
Olawale, Surajudeen Adebayo
;
Ismaila, Idris
;
Sulaimon, A. Bashir
Discover
Author
2
Joshua, Edward Mamza
2
Ojeniyi, Joseph A.
2
Shafi’i, Muhammad Abdulhamid
1
Abdulhamid, M. Shafi’i
1
Abdulhamid, Shafi’i Muhammad
1
Abdullahi, Monday Jubrin
1
Adamu, Abdulkadir
1
Adebayo, Olawale Surajudeen
1
Adedayo, Bolaji O.
1
Adeleke Jimoh, Ilyas
.
next >
Subject
1
Android Malware
1
Android Malware, Whale Optimizati...
1
Android Permission Feature
1
Benign Android Application
1
block-based method
1
Candidate Detectors
1
Categorization
1
CloudService Provider, Protocols,...
1
Copy-move image forgery
1
Copy-move image forgery, block-ba...
.
next >