Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Author
Title
Subject
Help
Sign on to:
My DSpace
Receive email
updates
Edit Profile
FUTMinna Institutional Repository
Search
Search:
All of DSpace
Journal Articles
SCHOOL OF INFORMATION AND COMMUNICATION TECHNOLOGY (SICT)
Cyber Security Science
for
Current filters:
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Start a new search
Add filters:
Use filters to refine the search results.
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Results 51-60 of 235 (Search time: 0.004 seconds).
previous
1
...
3
4
5
6
7
8
9
...
24
next
Item hits:
Issue Date
Title
Author(s)
2018-01
Application of Geo-Location-Based Access Control in an Enterprise Environment
Yisa, L. Victor
;
Baba, meshach
;
Osho, Oluwafemi
;
Sule, Anthony
2018-05-12
A Cloud-based Conceptual Framework for Multi-Objective Virtual Machine Scheduling using Whale Optimization Algorithm
Rana, Nadim
;
Abd Latiff, Shafie Muhammad
;
Abdulhamid, Shafi’i Muhammad
2018-05-01
Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniques
Ojeniyi, Joseph A.
;
Adedayo, Bolaji O.
;
Ismaila, Idris
;
Abdulhamid, Shafi’i Muhammad
2017-07-12
Performance Comparison of Heuristic Algorithms for Task Scheduling in IaaS Cloud Computing Environment
Madni, Syed Hamid Hussain
;
Abd Latiff, Muhammad Shafie
;
Mohammed, Abdullahi
;
Ngadi, M. A.
;
Abdulhamid, Shafi’i Muhammad
2017-06-07
Secure e-examination systems compared: Case studies from two countries
Fluck, Andrew
;
Adebayo, Olawale S.
;
Abdulhamid, Shafi’i Muhammad
2017-06-04
A Review on Mobile SMS Spam Filtering Techniques
Abdulhamid, Shafi’i Muhammad
;
Abd Latiff, Muhammad Shafie
;
Chiroma, Haruna
;
Osho, Oluwafemi
;
Abdul-Salaam, Gaddafi
;
Abubakar, Adamu I.
;
Herawan, Tutut
2019-05
Towards a Digital Policing in Developing Nations: The Nigerian Context
Ismaila, Idris
;
Yisa, Victor L.
;
Ikuesan, Adeyemi R.
;
Imavah, Shaka A.
;
Mohammad, Abdullahi B.
;
Abduldayan, Fatimah J
;
Baba, meshach
2012-12
THE SIMULATION OF PATH CONTROL AND ROUTE REDISTRIBUTION TECHNIQUES ON THE INTEGRATION OF WANs WITH DIFFERENT ROUTING PROTOCOLS
Abdulhamid, S. M.
;
Yisa, Victor L.
;
Baba, meshach
;
Njoku, C.O
2018-09
PASSWORD KNOWLEDGE VERSUS PASSWORD MANAGEMENT
ADAMA, VICTOR N.
;
DOGONYARO, NOEL MOSES
;
Yisa, Victor L.
;
Baba, Meshach
;
AYOBAMI, EKUNDAYO
2017-12-04
Distributed Denial of Service Detection using Multi Layered Feed Forward Artificial Neural Network
Ismaila, Idris
;
Obi, Blessing Fabian
;
Abdulhamid, Shafi’i M.
;
Olalere, Morufu
;
Baba, Meshach
Discover
Author
73
Ismaila, Idris
55
Abdulhamid, Shafi’i Muhammad
42
Adebayo, Olawale Surajudeen
28
Olalere, Morufu
13
Chiroma, Haruna
12
Morufu, Olalere
12
Ojeniyi, Joseph Adebayo
11
Abd Latiff, Muhammad Shafie
10
Ahmad, Suleiman
9
John, K. Alhassan
.
next >
Subject
10
Cryptography
8
Security
7
Malware
5
Computer privacy
5
Deep learning
5
Ransomware
5
Whale optimization algorithm
4
Attack
4
Cloud computing
4
Cloud Computing
.
next >
Date issued
39
2020 - 2024
196
2010 - 2019