Network security in cloud computing with elliptic curve cryptography VO Waziri, J Ojeniyi Canadian Center of Science and Education, 2013 | 132 | 2013 |
Privacy and national security issues in social networks: the challenges SM Abdulhamid, S Ahmad, VO Waziri, FN Jibril arXiv preprint arXiv:1402.3301, 2014 | 40 | 2014 |
Steganography and its applications in information dessimilation on the web using images as security embeddment: a wavelet approach VO Waziri, A Isah, A Ochoche, SM Abdulhamid International Journal of Computer and Information Technology (IJCIT), 2012 | 12 | 2012 |
A conceptual Nigeria stock exchange prediction: implementation using support vector machines-SMO model SM Abubakar, I Audu, OW Victor, KR Adeboye World of Computer Science and Information Technology Journal (WCSIT), 2013 | 11 | 2013 |
Threat modeling of electronic health systems and mitigating countermeasures JK Alhassan, E Abba, OM Olaniyi, OV Waziri SICT FUTMINNA, 2016 | 10 | 2016 |
Control operator for the two-dimensional energized wave equation VO Waziri, SA REJU Leonardo Journal of Sciences 9, 33-44, 2006 | 10 | 2006 |
Optimal Control of Energized Wave equations using the Extended Conjugate Gradient Method (ECGM) VO Waziri Ph. D. Thesis, Federal University of Technology, Minna, Nigeria, 2004 | 10 | 2004 |
Assessment of Information Security Awareness among Online Banking Costumers in Nigeria M Olalere, OV Waziri, I Ismaila, OS Adebayo, O Ololade International Journal of Advanced Research in Computer Science and Software …, 2014 | 9 | 2014 |
Cyber crimes analysis based-on open source digital forensics tools OW Victor, NO Okongwu, I Audu, SA Olawale, MA Shafi’í International Journal of Computer Science and Information Security, 2013 | 9 | 2013 |
Stateful hash-based digital signature schemes for bitcoin cryptocurrency MD Noel, OV Waziri, MS Abdulhamid, AJ Ojeniyi 2019 15th International Conference on Electronics, Computer and Computation …, 2019 | 8 | 2019 |
Big data analytics and data security in the cloud via fully homomorphic encryption VO Waziri, JK Alhassan, I Ismaila, MD Noel International Journal of Computer, Control, Quantum and Information Engineering,, 2015 | 7 | 2015 |
A forensic evidence recovery from mobile device applications JK Alhassan, A Gbolahan, I Idris, SM Abdulhamid, VO Waziri International Journal of Digital Enterprise Technology 1 (1-2), 79-95, 2018 | 5 | 2018 |
Extracting Android applications data for anomaly-based malware detection J Abah, VO Waziri, MB Abdullahi, OS Adewale, UA Ume Global Journals Inc.(USA), 2015 | 5 | 2015 |
Comparative analysis of classical and post-quantum digital signature algorithms used in Bitcoin transactions MD Noel, OV Waziri, MS Abdulhamid, AJ Ojeniyi, MU Okoro 2020 2nd International Conference on Computer and Information Sciences …, 2020 | 4 | 2020 |
A Secure Method to Hide Confidential Data Using Cryptography and Steganography JK Alhassan, I Ismaila, VO Waziri, A Abdulkadir International Conference on Information and Communication Technology and its …, 2016 | 4 | 2016 |
Data loss prevention and challenges faced in their deployments VO Waziri, I Ismaila, JK Alhassan, BO Adedayo International Conference on Information and Communication Technology and its …, 2016 | 4 | 2016 |
E-fraud forensics investigation techniques with formal concept analysis V Waziri, M Olalere, A Umar International Journal of Cyber-Security and Digital Forensics 3 (4), 235-245, 2014 | 4 | 2014 |
Big data analytics and the epitome of fully homomorphic encryption scheme for cloud computing security VO Waziri, JK Alhassan, M Olalere, I Ismaila | 4 | 2014 |
Information security on the communication network in Nigeria based on digital signature OS Adebayo, VO Waziri, JO Ojeniyi, SA Bashir, A Mishra International Journal of Computer Science and Information Security (IJCSIS), 2012 | 4 | 2012 |
The Analysis of the Two-dimensional Diffusion Equation With a Source VO Waziri, SA REJU Leonardo Electronic Journal of Practices and Technologies, 43-54, 2006 | 4 | 2006 |