Search


Current filters:

Start a new search
Add filters:

Use filters to refine the search results.


Results 1-10 of 13 (Search time: 0.005 seconds).
Item hits:
Issue DateTitleAuthor(s)
2019Phishing Attack Detection Based on Random Forest with Wrapper Feature Selection MethodAbdulrahman, Musbau Dogo; Alhassan, John K; Adebayo, Olawale Surajudeen; Ojeniyi, Joseph Adebayo; Olalere, Morufu
2018Security Risk Analysis and Management in GSM Operations Using MTN as a Case StudyNdatsu, Zainab; Adebayo, Olawale Surajudeen; Ojeniyi, Joseph Adebayo
2012information security on the communication network in Nigeria based on digital SignatureAdebayo, OS; Waziri, VO; Ojeniyi, Joseph Adebayo; Bashir, SA; Mishra, A
2013Network Security in Cloud Computing with Elliptic Curve CryptographyWaziri, V. O.; Ojeniyi, Joseph Adebayo; Hakimi, D; Audu, I; Abubakar, S.M.; Abdullahi, M. B.
2015Organizational Attendance Record System: Fraud and A Proposed Facial Recognition TechniqueOlalere, M; Ojeniyi, Joseph Adebayo; Osho, F; Ugwu, J.N.
2018Security Risk Analysis and Management in mobile wallet transaction: A Case study of Pagatech Nigeria LimitedAbdulrahamn, M. D.; Alhassan, J. K.; Ojeniyi, Joseph Adebayo; Abdulhamid, S. M.
2018Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature TechniquesOjeniyi, Joseph Adebayo; Adedayo, B. O.; Ismaila, I; Shafii, A. M.
2018A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection AttackOlalere, M; Egigogo, R. A.; Ojeniyi, Joseph Adebayo; Idris, I; Jimoh, R. G.
2018Security Risk Analysis and Management in Online Retailing Transactions, using Konga as a case studyEdward, J. M.; Idris, I; Ojeniyi, Joseph Adebayo; Abdulhamid, S. M.
2017HTTP Flood Mitigation Using Gateway Inspection and Second Chance Approach AnalysisIdris, I; Tobi, O. J.; Waziri, V. O.; Alhassan, J. K.; Ojeniyi, Joseph Adebayo