Search


Current filters:



Start a new search
Add filters:

Use filters to refine the search results.


Results 11-20 of 36 (Search time: 0.003 seconds).
Item hits:
Issue DateTitleAuthor(s)
2018-03-06A Soft Computing Approach to Detecting E-Banking Phishing Websites using Artificial Neural Network with Confusion MatrixAbdulhamid, Shafi’i Muhammad; Usman, Mubaraq Olamide; Ojerinde, Oluwaseun A.; Victor Ndako, Adama; Alhassan, John K
2018-07-02Security Risk Analysis and Management in mobile wallet transaction: A Case study of Pagatech Nigeria LimitedAbdulrahaman, Musbau D.; Alhassan, John K.; Ojeniyi, Joseph A.; Abdulhamid, Shafi’i Muhammad
2018-08-02Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing EnvironmentAbdulhamid, Shafi’i Muhammad; Sadiq, Nafisat Abubakar; Abdullahi, Mohammed; Rana, Nadim; Chiroma, Haruna; Gbenga, Dada Emmanuel
2018-04-03Progress on Artificial Neural Networksfor Big Data Analytics: A SurveyChiroma, Haruna; Abdullahi, Usman Ali; Abdulhamid, Shafi’i Muhammad
2018-02-10An Intelligent Crypto-locker Ransomware Detection Technique using Support Vector Machine Classification and Greywolf Optimization AlgorithmMaigida, Abdullahi Mohammed; Abdulhamid, Shafi’i Muhammad; Morufu, Olalere
2018-10-06An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian ClassifierChristopher, Haruna Atabo; Yakubu, Jimoh; Abdulhamid, Shafi’i Muhammad; Mohammed, Abdulmalik D
2018-12Secure Electronic Medical Records Transmission using NTRU Cryptosystem and LSB in Audio SteganographyAdamu, Abdulkadir; Shafi’i, Muhammad Abdulhamid; Oluwafem, Osho; Ismaila, Idris; John, K Alhassan
2018A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection AttackMorufu, Olalere; Raji, Abdullahi Egigogo; Ojeniyi, Joseph A.; Ismaila, Idris; Rasheed, Gbenga Jimoh
2018-04Privacy Preserving Classification Over Encrypted Data Using Fully Homomorphic Encryption TechniqueAbdullahi, Monday Jubrin; Victor, Onomza Waziri; Muhammad, Bashir Abdullahi; Ismaila, Idris
2018-11Security Risk Analysis and Management in Online Retailing Transactions, using Konga as a case studyJoshua, Edward Mamza; Ismaila, Idris; Joseph, A.Ojeniyi; Shafii, M. Abdulhamid