Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Author
Title
Subject
Help
Sign on to:
My DSpace
Receive email
updates
Edit Profile
FUTMinna Institutional Repository
Search
Search:
All of DSpace
Journal Articles
SCHOOL OF INFORMATION AND COMMUNICATION TECHNOLOGY (SICT)
Cyber Security Science
for
Current filters:
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Start a new search
Add filters:
Use filters to refine the search results.
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Results 1-10 of 13 (Search time: 0.005 seconds).
previous
1
2
next
Item hits:
Issue Date
Title
Author(s)
2017-06-04
A Review on Mobile SMS Spam Filtering Techniques
Abdulhamid, Shafi’i Muhammad
;
Abd Latiff, Muhammad Shafie
;
Chiroma, Haruna
;
Osho, Oluwafemi
;
Abdul-Salaam, Gaddafi
;
Abubakar, Adamu I.
;
Herawan, Tutut
2018-08-02
Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing Environment
Abdulhamid, Shafi’i Muhammad
;
Sadiq, Nafisat Abubakar
;
Abdullahi, Mohammed
;
Rana, Nadim
;
Chiroma, Haruna
;
Gbenga, Dada Emmanuel
2018-04-03
Progress on Artificial Neural Networksfor Big Data Analytics: A Survey
Chiroma, Haruna
;
Abdullahi, Usman Ali
;
Abdulhamid, Shafi’i Muhammad
2020-05-20
Deep Learning Architectures in Emerging Cloud Computing Architectures: Recent Development, Challenges and Next Research Trend
Fatsuma, Jauro
;
Chiroma, Haruna
;
Gital, Abdulsalam Y.
;
Almutairi, Mubarak
;
Abdulhamid, Shafi’i Muhammad
;
Abawajy, Jemal H.
2020-05-12
Detecting Ransomware Attacks Via Intelligent Algorithms: Recent Development and Next Direction from Deep Learning and Big Data Perspectives
Ibrahim, Bello
;
Chiroma, Haruna
;
Abdullahi, Usman A.
;
Yau, Abdulsalam Gital
;
Jauro, Fatsuma
;
Khan, Abdullah
;
Okesola, Julius O.
;
Abdulhamid, Shafi’i Muhammad
2019-04-20
Machine Learning for Email Spam Filtering: Review, Approaches, and Open Research Problems
Emmanuel, Dada
;
Adetunmbi, Adebayo
;
Chiroma, Haruna
;
Abdulhamid, Shafi’i Muhammad
;
Joseph, Stephen
;
Opeyemi, Ajibuwa
2020-06-20
Machine Learning Algorithms for Improving Security on Touch Screen Devices: A Survey, Challenges and New Perspectives
Bello, Auwal Ahmed
;
Chiroma, Haruna
;
Gital, Abdulsalam Y.
;
Gabralla, Lubna A.
;
Abdulhamid, Shafi’i Muhammad
;
Shuib, Liyana
2020-05-12
Whale Optimization Algorithm: A Systematic Review of Contemporary Applications, Modifications and Developments
Rana, Nadim
;
Abd Latiff, Muhammad Shafie
;
Abdulhamid, Shafi’i M.
;
Chiroma, Haruna
2019-07-20
Whale Optimization Algorithm: A Systematic Review of Contemporary Applications, Modifications and Developments
Rana, Nadim
;
Abd Latiff, Muhammad Shafie
;
Abdulhamid, Shafi’i M.
;
Chiroma, Haruna
2019-03-13
Systematic Literature Review and Metadata Analysis of Ransomware Attacks and Detection Mechanisms
Maigida, Abdullahi Mohammed
;
Abdulhamid, Shafi’i Muhammad
;
Olalere, Morufu
;
Alhassan, John K.
;
Chiroma, Haruna
;
Gbenga, Dada Emmanuel
Discover
Author
11
Abdulhamid, Shafi’i Muhammad
3
Abd Latiff, Muhammad Shafie
3
Rana, Nadim
2
Abdulhamid, Shafi’i M.
2
Abdullahi, Mohammed
2
Gbenga, Dada Emmanuel
2
Gital, Abdulsalam Y.
1
Abawajy, Jemal H.
1
Abdul-Salaam, Gaddafi
1
Abdullahi, Usman A.
.
next >
Subject
3
Deep learning
2
Big data analytics
2
Bubble-net hunting
2
Computer privacy
2
Edge computing
2
Fog computing
2
Machine learning algorithms
2
Meta-heuristic
2
Ransomware
2
Swarm based
.
next >
Date issued
4
2019
4
2020
2
2018
1
2011
1
2016
1
2017