Search


Current filters:


Start a new search
Add filters:

Use filters to refine the search results.


Results 1-10 of 13 (Search time: 0.003 seconds).
Item hits:
Issue DateTitleAuthor(s)
2018Detection of a Real - time Cyber- attack using Locator Agent AlgorithmIsah, O. A.; Alhassan, John K; Ismaila, Idris; Adebayo, Olawale Surajudeen
2019Enhanced Decision Tree-J48 with SMOTE Machine Learning Algorithm for Effective Botnet DetectionAdeleke, Ilyas; Ismaila, Idris; Olalere, Morufu
2016-11Data Loss Prevention and Challenges Faced in their DeploymentsWaziri, Victor O.; Ismaila, Idris; Alhassan, J. K.; Adedayo, Bolaji O.
2016-11A Secure Method to Hide Confidential Data Using Cryptography and SteganographyAlhassan, J. K.; Ismaila, Idris; Waziri, Victor O.; Abdulkadir, Adamu
2016-11Securing File on Cloud Computing System using Encryption Software: A Comparative AnalysisWaziri, Victor O.; Alhassan, J. K.; Ismaila, Idris; Raji, Abdullahi Egigogo
2017-10Mitigation of Sybil Attack on A Campus Network (CANET) Using Inter-Arrival Time Threshold and Physical Address ComparisonVictor, Onomza Waziri; Morufu, Olalere; Shafi’i, Muhammad A.; Ismaila, Idris
2011-12-14Negative Selection Algorithm In Artificial Immune System For Spam DetectionIsmaila, Idris; Ali, Selamat
2016-07Network System Design for Combating Cybercrime in NigeriaIsah, A.O; Alhassan, J.K; Sanjay, Misra; Ismaila, Idris; Broderick, Crawford; Ricardo, Soto
2018Detection of a Real-time Cyber-attack using Locator Agent Algorithm (C006)Isah, Abdulkadir Onivehu; Alhassan, J.K; Ismaila, Idris; Adebayo, O. Surajudeen
2019Investigation of Vulnerabilities of Oil and Gas Critical Infrastructures and Developing a Tracking Algorithm to Track Malicious Attacks on the Stream.Isah, O.A; Alhassan, J.K; Ismaila, Idris; Adebayo, O. S; Onuja, A. M