Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Author
Title
Subject
Help
Sign on to:
My DSpace
Receive email
updates
Edit Profile
FUTMinna Institutional Repository
Search
Search:
All of DSpace
Conference Papers
SCHOOL OF INFORMATION AND COMMUNICATION TECHNOLOGY (SICT)
Computer Science
Cyber Security Science
Information and Media Technology
Library Information Technology
for
Current filters:
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Start a new search
Add filters:
Use filters to refine the search results.
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Results 1-10 of 11 (Search time: 0.003 seconds).
previous
1
2
next
Item hits:
Issue Date
Title
Author(s)
2016
Development of Second-Level Authentication Process for A Higher Level Security in ATM Transactions
Alhassan, J. K.
;
Ochoche, A
;
Enagi, A. M
;
Shefiu, G. M
;
Muhammad-Bello, B. L.
2016-11
An Infallible Technique for Hiding Confidential Data in Compressed Video using LSB and RSA Algorithm
Idris, Ismaila
;
Onoja, Emmanuel Oche
;
Alhassan, J. K.
2016-11
Data Loss Prevention and Challenges Faced in their Deployments
Waziri, Victor O.
;
Ismaila, Idris
;
Alhassan, J. K.
;
Adedayo, Bolaji O.
2016-11
Threat Modeling of Electronic Health Systems and Mitigating Countermeasures
Alhassan, J. K.
;
Abba, Emmanuel
;
Olaniyi, O. M.
;
Waziri, Victor O.
2016-11
SIM Cards Forensic Capability and Evaluation of Extraction Tools
Idris, Ismaila
;
Alhassan, J. K.
;
Waziri, Victor O.
;
Majigi, Muhammad Umar
2016-11
A Secure Method to Hide Confidential Data Using Cryptography and Steganography
Alhassan, J. K.
;
Ismaila, Idris
;
Waziri, Victor O.
;
Abdulkadir, Adamu
2016-11
Integration of Parental Alert System into Students Online Payment System
Isah, A. O.
;
Alhassan, J. K.
;
Waziri, Victor O.
;
Lawal, K.H.
2016-11
Securing File on Cloud Computing System using Encryption Software: A Comparative Analysis
Waziri, Victor O.
;
Alhassan, J. K.
;
Ismaila, Idris
;
Raji, Abdullahi Egigogo
2016
Network System Design for Combating Cybercrime in Nigeria
Isah, Abdulkadir Onivehu
;
Alhassan, J. K.
;
Sanjay, Misra
;
Idris, I
;
Crawford, Broderick
;
Soto, Ricardo
2016
Integrity-Based Evaluation of Forensic Tools on Android Jelly Beans
Ojeniyi, Joseph Adebayo
;
Alhassan, J. K.
;
Ojerinde, O.A.
;
Ahmad, S
;
Okeke, O.C.
;
Ojeniyi, A.A.
Discover
Author
6
Waziri, Victor O.
3
Ismaila, Idris
2
Idris, Ismaila
2
Muhammad-Bello, B. L.
1
Abba, Emmanuel
1
Abdulkadir, Adamu
1
Adedayo, Bolaji O.
1
Ahmad, S
1
Crawford, Broderick
1
Enagi, A. M
.
next >
Subject
1
- authentication; security; trans...
1
-confidential data; video Compres...
1
-threat modeling; electronic heal...
1
authentication
1
automated teller machine
1
cloud; 7-zip; B1 Free Archiver; A...
1
Combating
1
cryptography; RSA algorithm; steg...
1
Cybercrime
1
Data loss prevention; Data loss; ...
.
next >
Has File(s)
11
true