Cyber Security Science : [236] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 181 to 200 of 236
Issue DateTitleAuthor(s)
2019-04-20Machine Learning for Email Spam Filtering: Review, Approaches, and Open Research ProblemsEmmanuel, Dada; Adetunmbi, Adebayo; Chiroma, Haruna; Abdulhamid, Shafi’i Muhammad; Joseph, Stephen; Opeyemi, Ajibuwa
2020-05-20Deep Learning Architectures in Emerging Cloud Computing Architectures: Recent Development, Challenges and Next Research TrendFatsuma, Jauro; Chiroma, Haruna; Gital, Abdulsalam Y.; Almutairi, Mubarak; Abdulhamid, Shafi’i Muhammad; Abawajy, Jemal H.
2020-05-12Detecting Ransomware Attacks Via Intelligent Algorithms: Recent Development and Next Direction from Deep Learning and Big Data PerspectivesIbrahim, Bello; Chiroma, Haruna; Abdullahi, Usman A.; Yau, Abdulsalam Gital; Jauro, Fatsuma; Khan, Abdullah; Okesola, Julius O.; Abdulhamid, Shafi’i Muhammad
2020-05-12Whale Optimization Algorithm: A Systematic Review of Contemporary Applications, Modifications and DevelopmentsRana, Nadim; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i M.; Chiroma, Haruna
2020-06-20Machine Learning Algorithms for Improving Security on Touch Screen Devices: A Survey, Challenges and New PerspectivesBello, Auwal Ahmed; Chiroma, Haruna; Gital, Abdulsalam Y.; Gabralla, Lubna A.; Abdulhamid, Shafi’i Muhammad; Shuib, Liyana
2012The Challenges of Missing Results of e-Examination in Nigerian UniversitiesShitu, Kelani Okunade; Adebayo, Olawale Surajudeen; Yisa, Victor L; baba, meshach
2018-01Application of Geo-Location-Based Access Control in an Enterprise EnvironmentYisa, L. Victor; Baba, meshach; Osho, Oluwafemi; Sule, Anthony
2010Application of Information Technology and its ChallengesMishra, Amit; Adebayo, Olawale Surajudeen; Abdullah, S. Y.; Mabayoje, Modina A.
2015Big data analytics and data security in the cloud via fully homomorphic encryptionWaziri, V.O; Alhassan, J.K; Ismaila, I.; Noel, M.D
2018PASSWORD KNOWLEDGE VERSUS PASSWORD MANAGEMENTAdama, V.N; Noel, M.D; Yisa, V.L; Meshach, B.; Ayobami, E.
2020DEVELOPMENT OF A FRAMEWORK FOR AIR REMARK APPLICATION: A CASE OF NIGERIAN AVIATION INDUSTRYEtuk, S.O; Sani, Y.M; Sunday, O.G; Noel, M.D
2019DEVELOPMENT OF CRYPTO-BIOMETRIC SYSTEM USING FINGERPRINT AND RSA MODEL FOR SECURE COMMUNICATIONNoel, M.D; Waziri, O.V; Sheidu, K.J
2011AUTOMATIC OFFLINE SIGNATURE VERIFICATION SYSTEMOlalere, Morufu
2011Security Application in Bluetooth TechnologyOlalere, Morufu; Ismaila, Idris
2011Partnering entrepreneurship and information technology (IT) for a better worldSakariyau, O. B.; Umar, Z.; Dauda, C. K.; Paiko, I. I.; Olalere, Maruf
2014Cyber Security Education: A Tool for National SecurityOlalere, Morufu; Waziri, Dr. Victor O; Ismaila, Idris; Adebayo, Olawale S.; Ugwu, Joel N.
2014Active Defence: An Evolving Gaming Strategy for Attacker Defender in a Network EnvironmentWaziri, Victor Onomza; Anuonye, Stanley Obinna; Olalere, Morufu; Ismaila, Idris
2014e-fraud Forensics Investigation Techniques with Formal Concept AnalysisWaziri, Victor Onomza; Umar, Abdullahi; Olalere, Morufu
2014Assessment of Information Security Awareness among Online Banking Costumers in NigeriaOlalere, Morufu; Waziri, Victor O.; Ismaila, Idris; Adebayo, Olawale S.; Olalode, O.
2014N-Cryptographic Multilevel Algorithm for Effective Information SecurityAdebayo, Olawale S.; Olalere, Morufu; Mishra, Amit; Mabayoje, M. A.; Ugwu, Joel N.
Collection's Items (Sorted by Submit Date in Descending order): 181 to 200 of 236