Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Author
Title
Subject
Help
Sign on to:
My DSpace
Receive email
updates
Edit Profile
FUTMinna Institutional Repository
Search
Search:
All of DSpace
Journal Articles
SCHOOL OF INFORMATION AND COMMUNICATION TECHNOLOGY (SICT)
Cyber Security Science
for
Current filters:
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Start a new search
Add filters:
Use filters to refine the search results.
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Results 11-20 of 36 (Search time: 0.003 seconds).
previous
1
2
3
4
next
Item hits:
Issue Date
Title
Author(s)
2018-03-06
A Soft Computing Approach to Detecting E-Banking Phishing Websites using Artificial Neural Network with Confusion Matrix
Abdulhamid, Shafi’i Muhammad
;
Usman, Mubaraq Olamide
;
Ojerinde, Oluwaseun A.
;
Victor Ndako, Adama
;
Alhassan, John K
2018-07-02
Security Risk Analysis and Management in mobile wallet transaction: A Case study of Pagatech Nigeria Limited
Abdulrahaman, Musbau D.
;
Alhassan, John K.
;
Ojeniyi, Joseph A.
;
Abdulhamid, Shafi’i Muhammad
2018-08-02
Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing Environment
Abdulhamid, Shafi’i Muhammad
;
Sadiq, Nafisat Abubakar
;
Abdullahi, Mohammed
;
Rana, Nadim
;
Chiroma, Haruna
;
Gbenga, Dada Emmanuel
2018-04-03
Progress on Artificial Neural Networksfor Big Data Analytics: A Survey
Chiroma, Haruna
;
Abdullahi, Usman Ali
;
Abdulhamid, Shafi’i Muhammad
2018-02-10
An Intelligent Crypto-locker Ransomware Detection Technique using Support Vector Machine Classification and Greywolf Optimization Algorithm
Maigida, Abdullahi Mohammed
;
Abdulhamid, Shafi’i Muhammad
;
Morufu, Olalere
2018-10-06
An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier
Christopher, Haruna Atabo
;
Yakubu, Jimoh
;
Abdulhamid, Shafi’i Muhammad
;
Mohammed, Abdulmalik D
2018-12
Secure Electronic Medical Records Transmission using NTRU Cryptosystem and LSB in Audio Steganography
Adamu, Abdulkadir
;
Shafi’i, Muhammad Abdulhamid
;
Oluwafem, Osho
;
Ismaila, Idris
;
John, K Alhassan
2018
A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection Attack
Morufu, Olalere
;
Raji, Abdullahi Egigogo
;
Ojeniyi, Joseph A.
;
Ismaila, Idris
;
Rasheed, Gbenga Jimoh
2018-04
Privacy Preserving Classification Over Encrypted Data Using Fully Homomorphic Encryption Technique
Abdullahi, Monday Jubrin
;
Victor, Onomza Waziri
;
Muhammad, Bashir Abdullahi
;
Ismaila, Idris
2018-11
Security Risk Analysis and Management in Online Retailing Transactions, using Konga as a case study
Joshua, Edward Mamza
;
Ismaila, Idris
;
Joseph, A.Ojeniyi
;
Shafii, M. Abdulhamid
Discover
Author
14
Ismaila, Idris
8
Abdulhamid, Shafi’i Muhammad
5
Ojeniyi, Joseph Adebayo
4
Adebayo, Olawale Surajudeen
4
Ojeniyi, Joseph A.
2
Abdulhamid, S. M.
2
Baba, Meshach
2
Baba, meshach
2
Chiroma, Haruna
2
Idris, I
.
next >
Subject
2
Cloud Computing
2
Detection, Categorization, Machin...
2
Online shopping, E-Commerce, Serv...
1
Access control
1
Administrator
1
Android Malware
1
Android Malware, Whale Optimizati...
1
Android Permission Feature
1
Ant Lion Optimization
1
Artificial Neural Network
.
next >