Search


Current filters:



Start a new search
Add filters:

Use filters to refine the search results.


Results 1-10 of 15 (Search time: 0.004 seconds).
Item hits:
Issue DateTitleAuthor(s)
2016-12Proposed Discriminative Lexical Features for Real-time Detection of Malware Uniform Resource LocatorOlalere, Morufu; Abdullah, Mohd Taufik; Mahmod &, Ramlan; Abdullah, Azizol
2016-01Bring Your Own Device: Security Challenges and A theoretical Framework for Two-Factor AuthenticationOlalere, Morufu; Abdullah, Mohd Taufik; Mahmod &, Ramlan; azizol, Abdullah
2016-03-01Resource Scheduling for Infrastructure as a Service (IaaS) in Cloud Computing: Challenges and OpportunitiesMadni, Syed Hamid Hussain; Abdulhamid, Shafi’i Muhammad; Yahaya, Coulibaly; Abdulhamid, Shafi’i Muhammad
2016-07-04Fault tolerance aware scheduling technique for cloud computing environment using dynamic clustering algorithmAbdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Madni, Syed Hamid Hussain; Abdullahi, Mohammed
2016-11-28Securing File on Cloud Computing System using Encryption Software: A Comparative AnalysisVictor, O. Waziri; John, K. Alhassan; Ismaila, Idris; Raji, Abdullahi Egigogo
2016-11-28SIM Cards Forensic Capability and Evaluation of Extraction ToolsIsmaila, Idris; John, K. Alhassan; Victor, O. Wa; Muhammad, Umar Majigi
2016-11Evaluating Capabilities Of Rootkits ToolsSubairu, Sikiru; Alhassan, John; Sanjay, Misra
2016A Critical Analysis of Component-Based Software EngineeringSubairu, Sikiru Olanrewaju
2016-09-10An Appraisal of Meta-Heuristic Resource Allocation Techniques for IaaS CloudMadni, Syed Hamid Hussain; Abd Latiff, Shafi’i Muhammad; Coulibaly, Yahaya; Abdulhamid, Shafi’i Muhammad
2016-02-13Recent Advancements in Resource Allocation Techniques for CloudMadni, Syed Hamid Hussain; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i Muhammad