Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Author
Title
Subject
Help
Sign on to:
My DSpace
Receive email
updates
Edit Profile
FUTMinna Institutional Repository
Search
Search:
All of DSpace
Conference Papers
SCHOOL OF INFORMATION AND COMMUNICATION TECHNOLOGY (SICT)
Computer Science
Cyber Security Science
Information and Media Technology
Library Information Technology
for
Current filters:
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Start a new search
Add filters:
Use filters to refine the search results.
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Results 1-3 of 3 (Search time: 0.003 seconds).
previous
1
next
Item hits:
Issue Date
Title
Author(s)
2017
Real-time Malware URL detection system based on Multi-layer Perceptron Neural Networks
Abdullah, Mohd Taufik
;
Olalere, Morufu
;
Mahmod, Ramlan
;
Abdullah, Azizol
2017
Forensic Acquisition of Data from a Crypt 12 Encrypted Database of Whatsapps
Alhassan, John K
;
Abubakar, Bilikisu
;
Olalere, Morufu
;
Abdulhamid, Shafi'i Muhammad
;
Ahmed, suleiman
2017
Mitigation of Sybil Attack on A Campus Network (Canet) Using Inter-Arrival Time Threshold and Physical Address Comparison
Waziri, Onomza Victor
;
Jimoh, Balikis Bukola
;
Olalere, Morufu
;
Abdulhamid, Shafi'I Muhammad
;
Idris, Ismaila
Discover
Author
1
Abdulhamid, Shafi'I Muhammad
1
Abdulhamid, Shafi'i Muhammad
1
Abdullah, Azizol
1
Abdullah, Mohd Taufik
1
Abubakar, Bilikisu
1
Ahmed, suleiman
1
Alhassan, John K
1
Idris, Ismaila
1
Jimoh, Balikis Bukola
1
Mahmod, Ramlan
.
next >
Subject
1
artificial neural network
1
blacklisting
1
computer network
1
computer security
1
Database
1
Forensic Analysis
1
inter-arrival time
1
malware URL
1
Mobile Phones
1
multi-layer perceptron
.
next >
Has File(s)
3
true