Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Author
Title
Subject
Help
Sign on to:
My DSpace
Receive email
updates
Edit Profile
FUTMinna Institutional Repository
Search
Search:
All of DSpace
Journal Articles
SCHOOL OF INFORMATION AND COMMUNICATION TECHNOLOGY (SICT)
Cyber Security Science
for
Current filters:
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Start a new search
Add filters:
Use filters to refine the search results.
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Results 21-30 of 31 (Search time: 0.003 seconds).
previous
1
2
3
4
next
Item hits:
Issue Date
Title
Author(s)
2019-05-12
Security Challenges in Fog Computing Environment: A Systematic Appraisal of Current Developments
Yakubu, Jimoh
;
Abdulhamid, Shafi’i Muhammad
;
Christopher, Haruna Atabo
;
Chiroma, Haruna
;
Abdullahi, Mohammed
2019-12
Random Forest Based Hypertext Transfer Protocol Distributed Denial of Service Attack Detection System for Cloud Computing Environment
Morufu, Olalere
;
Rukayya, Umar
;
Juliana, Ndunagu
;
Ismaila, Idris
;
Raji, Abdullahi Egigogo
;
Suleiman, Muhammad Nasir
2019
Performance Evaluation of Machine Learning Algorithms for Hypertext Transfer Protocol Distributed Denial of Service Intrusion Detection
Rukayya, Umar
;
Morufu, Olalere
;
Ismaila, Idris
;
Raji, Abdullahi Egigogo
;
Bolarin, G
2019-04-02
Whale optimization algorithm-based email spam feature selection method using rotation forest algorithm for classification
Maryam, Shuaib
;
Shafi’i, Muhammad Abdulhamid
;
Olawale, Surajudeen Adebayo
;
Oluwafemi, Osho
;
Ismaila, Idris
;
John, K. Alhassan
;
Nadim, Rana
2019-03
Secure University Network Architecture, Vulnerabilities, Risk Priority Level Classification And Countermeasures
Ismaila, Idris
;
Muhammad, Umar Majigi
;
Shafi'i, Muhammad Abdulhamid
;
Morufu, Olalere
;
Muhammad, Bashir Abdullahi
;
Vivian, O. Nwaocha
2019
Towards a Digital Policing in Developing Nations: The Nigerian Context
Ismaila, Idris
;
Yisa, Victor
;
Ikuesan, Richard
;
Shakah, Imavah
2019-06-30
Smart Financial Fraud Detection and Customer risk Profilling in Finalcial Institutions to Identify Potential Criminals using Genetic Markov Algorithm
Idris, Muhammad S.
;
Ismaila, Idris
2019-05
Towards a Digital Policing in Developing Nations: The Nigerian Context.
Ismaila, Idris
;
Yisa, Victor
;
Adeyemi, R. Ikuesan
;
Apodoghe Imavah, Shaka
;
Mohammad . B, Abdullahi
;
Abduldayan, Fatimah
;
Baba, Meshach
2019-03
An intelligent crypto-locker ransomware detection technique using support vector machine classification and grey wolf optimization algorithms
Ismaila, Idris
;
Shafi’i, Muhammad Abdulhamid
;
Morufu, Olalere
;
Abdullahi, Muhammad Maigida
2019-06
Forensic Analysis of Mobile Banking Applications In Nigeria
Andrew, A. Uduimoh
;
Oluwafemi, Osho
;
Ismaila, Idris
;
Shafi'i, M. Abdulhamid
Discover
Author
12
Ismaila, Idris
8
Abdulhamid, Shafi’i Muhammad
6
Adebayo, Olawale Surajudeen
6
Morufu, Olalere
5
Olalere, Morufu
4
Alhassan, John K.
4
Chiroma, Haruna
3
Abdulhamid, Shafi’I Muhammad
3
Abdullahi, Mohammed
3
Idris, Ismaila
.
next >
Subject
3
Malware
3
Ransomware
3
Whale optimization algorithm
2
Crypto ransomware
2
Cyber-attack
2
Email spam
2
Feature selection
2
Locker ransomware
2
Metaheuristic algorithm
2
Optimization
.
next >