Search


Current filters:
Start a new search
Add filters:

Use filters to refine the search results.


Results 11-20 of 88 (Search time: 0.003 seconds).
Item hits:
Issue DateTitleAuthor(s)
2020-09A Comparative Experimental Evaluation of the Detection Rates and Removal Abilities of Fifteen Malware Detector Tools on Xpaj.MBR RootkitSubairu, S. O.; Alhassan, J. K.; Nwaocha, V. O.; Saidu, I. R.
2020Empirical Design Framework for Development of Convolutional Neural Network Based ModelSubairu, S. O.; Alhassan, J. K.; Abdulhamid, S. M.; Ojeniyi, J. A.
2008An Evaluation of Cost-Effectiveness of Micro Computerized Documentation System/Integrated Set of Information System (CDS/ISIS) Software of Raw Materials Research and Development Council (RMRDC), AbujaAlhassan, J. K.; Aliu, G
2008Perception of Students About Online Registration: A Case Study of Federal University of Technology, MinnaAdepoju, S. A; Alhassan, J. K.
2009An Evaluation of Information Technology (IT) Usage Among Undergraduate Students: A Case Study of Federal University of Technology MinnaAlhassan, J. K.
2010Performance Evaluation of the Wireless Local Area Networks (WLAN) of Federal University of Technology, Minna, Bosso CampusAlhassan, J. K.; Hakimi, D
2012-12Forecasting Nigeria Foreign Exchange Rates Using Artificial Neural NetworkAlhassan, J. K.; Misra, S; Ogwueleka, F; Inyiama, H. C.
2018A Fuzzy Classifier-Based Penetration Testing for Web ApplicationsAlhassan, J. K.; Misra, Sanjay; Umar, A; Maskeliūnas, Rytis; Damaševičius, Robertas; Adewumi, Adewole
2018Comparative Evaluation of Mobile Forensic ToolsAlhassan, J. K.; Oguntoye, R. T; Misra, Sanjay; Adewumi, Adewole; Maskeliunas, Rytis; Damaševicius, Robertas
2016Development of Second-Level Authentication Process for A Higher Level Security in ATM TransactionsAlhassan, J. K.; Ochoche, A; Enagi, A. M; Shefiu, G. M; Muhammad-Bello, B. L.