Cyber Security Science : [236] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 141 to 160 of 236
Issue DateTitleAuthor(s)
2016Online Social Networks: A Survey of Usage and Risks Experience among University Students in North-Central NigeriaYisa, Victor; Oluwafemi, Osho; Soje, Isaac
2018Application of Geo-Location-Based Access Control in an Enterprise EnvironmentYisa, Victor; Baba, Meshach; Oluwafemi, Osho; Sule, Anthony
2016-11-28A Secure Method to Hide Confidential Data Using Cryptography and SteganographyJohn K., Alhassan; Ismaila, Idris; Victor. O, Waziri; Adamu, Abdulkadir
2013A Negative Selection Algorithm Based on Email Classification TechniquesVictor O., Waziri; Ismaila, Idris; Mohammed Bashir, Abdullahi; Hakimi, Danladi; Audu, Isah
2018A Forensic Evidence Recovery from Mobile Device ApplicationsJohn K., Alhassan; Agbejule, Gbolahan; Ismaila, Idris; Mohammed Abdulhamid, Shafii; Victor O., Onomza
2018Security Risk Analysis and Management in Electronic Payment Switching System in Nigeria, eTranzact International Plc. as a Case StudyAdeleke Jimoh, Ilyas; Ojeniyi . A, Joseph; Ismaila, Idris
2019-05Towards a Digital Policing in Developing Nations: The Nigerian Context.Ismaila, Idris; Yisa, Victor; Adeyemi, R. Ikuesan; Apodoghe Imavah, Shaka; Mohammad . B, Abdullahi; Abduldayan, Fatimah; Baba, Meshach
2016-07-04Fault tolerance aware scheduling technique for cloud computing environment using dynamic clustering algorithmAbdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Madni, Syed Hamid Hussain; Abdullahi, Mohammed
2016-03-01Resource Scheduling for Infrastructure as a Service (IaaS) in Cloud Computing: Challenges and OpportunitiesMadni, Syed Hamid Hussain; Abdulhamid, Shafi’i Muhammad; Yahaya, Coulibaly; Abdulhamid, Shafi’i Muhammad
2017-08-02Symbiotic Organism Search Optimization Based Task Scheduling in Cloud Computing EnvironmentAbdullahi, Mohammed; Ngadi, Md Asri; Abdulhamid, Shafi’i Muhammad
2017-04-06Optimal Resource Scheduling for IaaS Cloud Computing using Cuckoo Search AlgorithmAbdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Abdul—Salaam, Gaddafi; Madni, Syed Hamid Hussain
2017-03-02Optimal Resource Scheduling for IaaS Cloud Computing using Cuckoo Search AlgorithmMadni, Syed Hamid Hussain; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i Muhammad
2019-06EVALUATION OF MOBILE BANKING SERVICES USAGE IN MINNA, NIGER STATEBaba, Meshach; DOGONYARO, NOEL MOSES; Yisa, Victor L.; OLATUNDE, MAJEEDAH OMOBOLANLE
2014-09Evaluation of Business Continuity and Information Disaster Recovery Mechanism in Top Universities in North CyprusYisa, Victor L.; Baba, Meshach
2017-12-04Distributed Denial of Service Detection using Multi Layered Feed Forward Artificial Neural NetworkIsmaila, Idris; Obi, Blessing Fabian; Abdulhamid, Shafi’i M.; Olalere, Morufu; Baba, Meshach
2018-09PASSWORD KNOWLEDGE VERSUS PASSWORD MANAGEMENTADAMA, VICTOR N.; DOGONYARO, NOEL MOSES; Yisa, Victor L.; Baba, Meshach; AYOBAMI, EKUNDAYO
2012-12THE SIMULATION OF PATH CONTROL AND ROUTE REDISTRIBUTION TECHNIQUES ON THE INTEGRATION OF WANs WITH DIFFERENT ROUTING PROTOCOLSAbdulhamid, S. M.; Yisa, Victor L.; Baba, meshach; Njoku, C.O
2019-05Towards a Digital Policing in Developing Nations: The Nigerian ContextIsmaila, Idris; Yisa, Victor L.; Ikuesan, Adeyemi R.; Imavah, Shaka A.; Mohammad, Abdullahi B.; Abduldayan, Fatimah J; Baba, meshach
2017-06-07Secure e-examination systems compared: Case studies from two countriesFluck, Andrew; Adebayo, Olawale S.; Abdulhamid, Shafi’i Muhammad
2017-06-04A Review on Mobile SMS Spam Filtering TechniquesAbdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Chiroma, Haruna; Osho, Oluwafemi; Abdul-Salaam, Gaddafi; Abubakar, Adamu I.; Herawan, Tutut
Collection's Items (Sorted by Submit Date in Descending order): 141 to 160 of 236