Collection's Items (Sorted by Submit Date in Descending order): 221 to 236 of 236
Issue Date | Title | Author(s) |
2018-09-05 | An Online Lecturer Evaluation System: A Case of FUT Minna | Sulaiman, Sufyan Danmalan; Adeoluwa, David Apata; Ojerinde, Oluwaseun Adeniyi; Mustapha, Segilola Ifeoma; Adebayo, Olawale Surajudeen |
2019-08 | Improved Malware Detection Model with Apriori Association Rule and Particle Swarm Optimization | Adebayo, Olawale Surajudeen; Abdul Aziz, Normaziah |
2015-05 | Organizational Attendance Record System: Fraud and A Proposed Facial Recognition Technique | Olalere, Morufu; Osho, Femi; Ojeniyi, Adebayo J.; Ugwu, Joel N. |
2015-04-10 | A Review of Bring Your Own Device on Security Issues | Olalere, Morufu; Abdullah, Mohd Taufik; Mahmod, Ramlan; Abdullah, Azizol |
2016-01 | Bring Your Own Device: Security Challenges and A theoretical Framework for Two-Factor Authentication | Olalere, Morufu; Abdullah, Mohd Taufik; Mahmod &, Ramlan; azizol, Abdullah |
2016-12 | Proposed Discriminative Lexical Features for Real-time Detection of Malware Uniform Resource Locator | Olalere, Morufu; Abdullah, Mohd Taufik; Mahmod &, Ramlan; Abdullah, Azizol |
2017-09 | Vulnerability Assessment of Some Key Nigeria Government Websites | Ismaila, Idris; Majigi, Mohammad Umar; Abdulhamid, Shafii; Olalere, Morufu; Saidu, Isah Rambo |
2017-12 | Distributed Denial of Service Detection using Multi Layered Feed Forward Artificial Neural Network | Ismaila, Idris; Obi, Blessing Fabian; Abdulhamid, Shafi’i M.; Olalere, Morufu; Baba, Meshach |
2018 | A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection Attack | Olalere, Morufu; Egigogo, Raji Abdullahi; Ojeniyi, Joseph A; Ismaila, Idris; Jimoh, Rasheed Gbenga |
2019-03-19 | Secure University Network Architecture, Vulnerabilities, Risk Priority Level Classification and Countermeasures | Ismaila, Idris; Majigi, Muhammad Umar; Abdulhamid, Shafi’I Muhammad; Morufu, Olalere; Abdullahi, Muhammad Bashir; Nwaoch, Vivian O. |
2019-03-19 | An Intelligent Crypto-locker Ransomware Detection Technique using Support Vector Machine Classification and Grey Wolf Optimization Algorithms | Maigida, Abdullahi; Abdulhamid, Shafi’I Muhammad; Olalere, Morufu; Idris, Ismaila |
2019-05-03 | Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms | Maigida, Abdullahi Mohammed; Abdulhamid, Shafi’I Muhammad; Morufu, Olalere; Alhassan, John K.; Haruna, Chiroma; Dada, Emmanuel Gbenga |
2019-12 | Phishing Attack Detection Based on Random Forest with Wrapper Feature Selection Method | Abdulrahaman, Musbau Dogo; Alhassan, John K.; Adebayo, Olawale Surajudeen; Ojeniyi, Josephy A.; Olalere, Morufu |
2019-12 | Random Forest Based Hypertext Transfer Protocol Distributed Denial of Service Attack Detection System for Cloud Computing Environment | Olalere, Morufu; Umar, Rukkaya; Ndunagu, Juliana; Idris, Ismaila; Egigogo, Raji Abdullahi; Nasir, Suleiman Muhammad |
2020-05 | Identification of Best Machine Learning Algorithms for Detection of HTTP Botnet Attack | Olalere, Morufu; Yisa, Rhoda Nnaba; Ojeniyi, Joseph A; Nwaocha, Vivian O. |
2020-10-24 | Blockchain Technology in IoT Systems: Current Trends, Methodology, Problems, Applications, and Future Directions | Alfa, Abraham Ayegba; Alhassan, John Kolo; Olaniyi, Olayemi Mikail; Olalere, Morufu |
Collection's Items (Sorted by Submit Date in Descending order): 221 to 236 of 236