Cyber Security Science : [236] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 236
Issue DateTitleAuthor(s)
2023-04-04Systematic Literature Review and Metadata Analysis of Insider Threat Detection MechanismIsmaila, Idris; Adeleke, Nafisa Damilola
2023-03-14Impact Analysis and Features for DDOS Attacks Detection in SDNAbdullahi, Aishatu Wabi; Ismaila, Idris; Olayemi, Mikail Olaniyi; Joseph, A. Ojeniyi
2014Assessment of Information Security Awareness among Online Banking Costumers in NigeriaOlalere, Morufu; Waziri, Onomza Victor; Ismaila, Idris; Adebayo, Olawale Surajudeen; Ololade, O
2020-09-10Improved Genetically Optimized Neural Network Algorithm for the Classification of Distributed Denial of Service AttackGadzama, Emmanuel Hamman; Adebayo, Olawale Surajudeen
2021-08-20Convolutional neural network-based approach for dermatological disease predictionAfiz, Adeniyi; Bashir, Sulaimon Adebayo; Adebayo, Olawale Surajudeen; Ganiyu, Shefiu Olusegun
2022-10-20Intelligent Criminal Identification System For Semi-Regulated EnvironmentsGaniyu, Shefiu Olusegun; Akpagher, T. D.; Olaniyi, Mikail Olayemi; Adebayo, Olawale Surajudeen
2022Review and analysis of classical algorithms and hash-based post-quantum algorithmNoel, M. D.; Waziri, V.O.; Abdulhmid, S. M.; Ojeniyi, Joseph Adebayo
2018Security Risk Analysis and Management in mobile wallet transaction: A Case study of Pagatech Nigeria LimitedAbdulrahamn, M. D.; Alhassan, J. K.; Ojeniyi, Joseph Adebayo; Abdulhamid, S. M.
2018Security Risk Analysis and Management in Online Retailing Transactions, using Konga as a case studyEdward, J. M.; Idris, I; Ojeniyi, Joseph Adebayo; Abdulhamid, S. M.
2017HTTP Flood Mitigation Using Gateway Inspection and Second Chance Approach AnalysisIdris, I; Tobi, O. J.; Waziri, V. O.; Alhassan, J. K.; Ojeniyi, Joseph Adebayo
2018A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection AttackOlalere, M; Egigogo, R. A.; Ojeniyi, Joseph Adebayo; Idris, I; Jimoh, R. G.
2819Security Risk Analysis in Online Banking Transactions: Using Diamond Bank as a Case StudyOjeniyi, Joseph Adebayo; Edward, E.O.; Abdulhmid, S. M.
2018Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature TechniquesOjeniyi, Joseph Adebayo; Adedayo, B. O.; Ismaila, I; Shafii, A. M.
2015Organizational Attendance Record System: Fraud and A Proposed Facial Recognition TechniqueOlalere, M; Ojeniyi, Joseph Adebayo; Osho, F; Ugwu, J.N.
2013Network Security in Cloud Computing with Elliptic Curve CryptographyWaziri, V. O.; Ojeniyi, Joseph Adebayo; Hakimi, D; Audu, I; Abubakar, S.M.; Abdullahi, M. B.
2012information security on the communication network in Nigeria based on digital SignatureAdebayo, OS; Waziri, VO; Ojeniyi, Joseph Adebayo; Bashir, SA; Mishra, A
2013Network Security in Cloud Computing with Elliptic Curve CryptographyWaziri, V. O.; Ojeniyi, Joseph + "Adebayo"
2021-08-31COVID-19 ANDROID-BASED TEXT-TO-SPEECH APPLICATION: AN INCLUSION OF PEOPLE LIVING WITH READING AND SIGHTING DISABILITIESYAHAYA, M.S; EMMANUEL, I.O; NOEL, M.D; BENJAMIN, P.D
2021-09-03Review and analysis of classical algorithms and hash-based post-quantum algorithmNoel, Moses Dogonyaro; Waziri, Onomza Victor; Abdulhamid, Muhammad Shafii; Ojeniyi, Adebayo Joseph
2021-09Secured E-Commerce System using ECC and Multimodal BiometricsOnuja, Abdulkareem; Oyefolahan, Ishaq Oyebisi; Adebayo, Olawale Surajudeen; Isah, Abdulkadir O; Olaniyi, Mika'il Olayemi
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 236