Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Author
Title
Subject
Help
Sign on to:
My DSpace
Receive email
updates
Edit Profile
FUTMinna Institutional Repository
Search
Search:
All of DSpace
Book of Proceeding
Books
Conference Papers
Convocation
Inaugural Lectures
Journal Articles
Lecture Notes
Multimedia Resources
Newsletters/Service Delivery/Graduation Booklets
Open Education Reources
Past Questions
Public Lectures and Speeches
Seminar Papers/Campus News/Reports
Theses and Dissertations
Undergraduate Projects
University Library
for
Current filters:
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Start a new search
Add filters:
Use filters to refine the search results.
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Results 81-87 of 87 (Search time: 0.004 seconds).
previous
1
...
6
7
8
9
next
Item hits:
Issue Date
Title
Author(s)
2018
Security Risk Analysis and Management in mobile wallet transaction: A Case study of Pagatech Nigeria Limited
Abdulrahamn, M. D.
;
Alhassan, J. K.
;
Ojeniyi, Joseph Adebayo
;
Abdulhamid, S. M.
2017
HTTP Flood Mitigation Using Gateway Inspection and Second Chance Approach Analysis
Idris, I
;
Tobi, O. J.
;
Waziri, V. O.
;
Alhassan, J. K.
;
Ojeniyi, Joseph Adebayo
2019
Phishing attack detection based on random forest with wrapper feature selection method
Abdulrahamn, M.D.
;
Alhassan, J. K.
;
Adebayo, O. S.
;
Ojeniyi, Joseph Adebayo
;
Olalere, M
2016
Integrity-Based Evaluation of Forensic Tools on Android Jelly Beans
Ojeniyi, Joseph Adebayo
;
Alhassan, J. K.
;
Ojerinde, O.A.
;
Ahmad, S
;
Okeke, O.C.
;
Ojeniyi, A.A.
2018
A Genetically Optimized Model in Determining Applications for Desired Stream Ciphers
Edward, J. M.
;
Alhassan, J. K.
;
Ojeniyi, Joseph Adebayo
2016
Development of Second-Level Authentication Process for a Higher Level Security in ATM Transactions
Alhassan, J. K.
;
Ochoche, A.
;
Enagi, A. M.
;
Ganiyu, S.O.
;
Muhammad-Bello, B. L.
2021-06
A Review on Methods for Selecting E-Commerce Platforms
Suleiman, M. M.
;
Alhassan, J. K.
;
Abdulmalik, M. D.
;
Aminu, E. F.
Discover
Author
9
Ismaila, Idris
8
Waziri, Victor O.
6
Isah, Abdulkadir Onivehu
6
Subairu, S. O.
5
Misra, Sanjay
5
Ojeniyi, Joseph Adebayo
5
Waziri, Victor Onomza
4
Adebayo, O. S.
4
Adepoju, Solomon A.
4
Idris, Ismaila
.
next >
Subject
2
DDOS attack; Mitigation
2
Encryption
2
Model, Distributed Database Syste...
1
- authentication; security; trans...
1
-confidential data; video Compres...
1
-threat modeling; electronic heal...
1
: Artificial Neural Networks; For...
1
: Hybrid Cryptosystem, Random Ora...
1
Achievement
1
agents
.
next >
Date issued
8
2020 - 2021
68
2010 - 2019
11
2005 - 2009
Has File(s)
87
true