关注
Victor Waziri
Victor Waziri
在 futminna.edu.ng 的电子邮件经过验证
标题
引用次数
引用次数
年份
Network security in cloud computing with elliptic curve cryptography
VO Waziri, J Ojeniyi
Canadian Center of Science and Education, 2013
1322013
Privacy and national security issues in social networks: the challenges
SM Abdulhamid, S Ahmad, VO Waziri, FN Jibril
arXiv preprint arXiv:1402.3301, 2014
402014
Steganography and its applications in information dessimilation on the web using images as security embeddment: a wavelet approach
VO Waziri, A Isah, A Ochoche, SM Abdulhamid
International Journal of Computer and Information Technology (IJCIT), 2012
122012
A conceptual Nigeria stock exchange prediction: implementation using support vector machines-SMO model
SM Abubakar, I Audu, OW Victor, KR Adeboye
World of Computer Science and Information Technology Journal (WCSIT), 2013
112013
Threat modeling of electronic health systems and mitigating countermeasures
JK Alhassan, E Abba, OM Olaniyi, OV Waziri
SICT FUTMINNA, 2016
102016
Control operator for the two-dimensional energized wave equation
VO Waziri, SA REJU
Leonardo Journal of Sciences 9, 33-44, 2006
102006
Optimal Control of Energized Wave equations using the Extended Conjugate Gradient Method (ECGM)
VO Waziri
Ph. D. Thesis, Federal University of Technology, Minna, Nigeria, 2004
102004
Assessment of Information Security Awareness among Online Banking Costumers in Nigeria
M Olalere, OV Waziri, I Ismaila, OS Adebayo, O Ololade
International Journal of Advanced Research in Computer Science and Software …, 2014
92014
Cyber crimes analysis based-on open source digital forensics tools
OW Victor, NO Okongwu, I Audu, SA Olawale, MA Shafi’í
International Journal of Computer Science and Information Security, 2013
92013
Stateful hash-based digital signature schemes for bitcoin cryptocurrency
MD Noel, OV Waziri, MS Abdulhamid, AJ Ojeniyi
2019 15th International Conference on Electronics, Computer and Computation …, 2019
82019
Big data analytics and data security in the cloud via fully homomorphic encryption
VO Waziri, JK Alhassan, I Ismaila, MD Noel
International Journal of Computer, Control, Quantum and Information Engineering,, 2015
72015
A forensic evidence recovery from mobile device applications
JK Alhassan, A Gbolahan, I Idris, SM Abdulhamid, VO Waziri
International Journal of Digital Enterprise Technology 1 (1-2), 79-95, 2018
52018
Extracting Android applications data for anomaly-based malware detection
J Abah, VO Waziri, MB Abdullahi, OS Adewale, UA Ume
Global Journals Inc.(USA), 2015
52015
Comparative analysis of classical and post-quantum digital signature algorithms used in Bitcoin transactions
MD Noel, OV Waziri, MS Abdulhamid, AJ Ojeniyi, MU Okoro
2020 2nd International Conference on Computer and Information Sciences …, 2020
42020
A Secure Method to Hide Confidential Data Using Cryptography and Steganography
JK Alhassan, I Ismaila, VO Waziri, A Abdulkadir
International Conference on Information and Communication Technology and its …, 2016
42016
Data loss prevention and challenges faced in their deployments
VO Waziri, I Ismaila, JK Alhassan, BO Adedayo
International Conference on Information and Communication Technology and its …, 2016
42016
E-fraud forensics investigation techniques with formal concept analysis
V Waziri, M Olalere, A Umar
International Journal of Cyber-Security and Digital Forensics 3 (4), 235-245, 2014
42014
Big data analytics and the epitome of fully homomorphic encryption scheme for cloud computing security
VO Waziri, JK Alhassan, M Olalere, I Ismaila
42014
Information security on the communication network in Nigeria based on digital signature
OS Adebayo, VO Waziri, JO Ojeniyi, SA Bashir, A Mishra
International Journal of Computer Science and Information Security (IJCSIS), 2012
42012
The Analysis of the Two-dimensional Diffusion Equation With a Source
VO Waziri, SA REJU
Leonardo Electronic Journal of Practices and Technologies, 43-54, 2006
42006
系统目前无法执行此操作,请稍后再试。
文章 1–20