Network Security in Cloud Computing with Elliptic Curve Cryptography VO Waziri, JA Ojeniyi, D Hakimi, I Audu, SM Abubakar, MB Abdullahi Network and Communication Technologies 2 (2), 43-58, 2013 | 129 | 2013 |
Security risk analysis in online banking transactions: Using diamond bank as a case study JA Ojeniyi, EO Edward, SM Abdulhamid International Journal of Education and Management Engineering 9 (2), 1-14, 2019 | 30 | 2019 |
Security risk analysis and management in banking sector: A case study of a selected commercial bank in Nigeria NN Gana, SM Abdulhamid, JA Ojeniyi International Journal of Information Engineering and Electronic Business …, 2019 | 17 | 2019 |
Security risk analysis and management in mobile wallet transaction: a case study of pagatech nigeria limited MD Abdulrahaman, JK Alhassan, JA Ojeniyi, SM Abdulhamid International Journal of Computer Network and Information Security (IJCNIS), 2018 | 14 | 2018 |
A review of DNA cryptograhic approaches MA Iliyasu, OA Abisoye, SA Bashir, JA Ojeniyi 2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA), 66-72, 2021 | 13 | 2021 |
Hybridized technique for copy-move forgery detection using discrete cosine transform and speeded-up robust feature techniques AO Joseph, OA Bolaji, I Ismaila, M Abdulhamid IJ Image, Graphics and Signal Processing, 2018 | 13 | 2018 |
Phishing attack detection based on random forest with wrapper feature selection method MD Abdulrahaman, JK Alhassan, OS Adebayo, JA Ojeniyi, M Olalere | 11 | 2019 |
Stateful hash-based digital signature schemes for bitcoin cryptocurrency MD Noel, OV Waziri, MS Abdulhamid, AJ Ojeniyi 2019 15th International Conference on Electronics, Computer and Computation …, 2019 | 8 | 2019 |
A Simple Encryption and Decryption System O Osho, YO Zubair, JA Ojeniyi Isteams Research Nexus Conference 1 (5), 77-84, 2014 | 7 | 2014 |
A Review of Detection Methodologies for Quick Response code Phishing Attacks S Subairu, J Alhassan, S Abdulhamid, J Ojeniyi 2020 2nd International Conference on Computer and Information Sciences …, 2020 | 5 | 2020 |
A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection Attack M Olalere, RA Egigogo, JA Ojeniyi, I Ismaila, RG Jimoh | 5 | 2018 |
Comparative analysis of classical and post-quantum digital signature algorithms used in Bitcoin transactions MD Noel, OV Waziri, MS Abdulhamid, AJ Ojeniyi, MU Okoro 2020 2nd International Conference on Computer and Information Sciences …, 2020 | 4 | 2020 |
Information Security on the Communication Network in Nigeria Based on Digital Signature OS Adebayo, VO Waziri, JA Ojeniyi, SA Bashir, A Mishra International Journal of Computer Science and Information Security 10 (11 …, 2012 | 4 | 2012 |
A systematic literature review on digital evidence admissibility: methodologies, challenges and research directions EO Edward, JA Ojeniyi 2019 15th International Conference on Electronics, Computer and Computation …, 2019 | 3 | 2019 |
Granger Causality Test: A Useful Descriptive Tool for Time Series Data ES Oguntade, SO Olanrewaju, JA Ojeniyi International Journal of Modern Engineering Research 4 (5), 16-20, 2014 | 3 | 2014 |
Cloud Intrution Detection System Using Antlion Optimization Algorithm and Support Vector Machine (SVM) Techniques HA Christopher, JA Ojeniyi, SA Adepoju, OA Abisoye 2023 International Conference on Science, Engineering and Business for …, 2023 | 2 | 2023 |
Hate and Offensive Speech Detection Using Term Frequency-Inverse Document Frequency (TF-IDF) and Majority Voting Ensemble Machine Learning Algorithms C Okechukwu, I Idris, JA Ojeniyi, M Olalere 4th International Engineering Conference (IEC 2023), 2023 | 2 | 2023 |
A Review of DNA Cryptographic Approaches AI Mohammed, OA Abisoye, JA Ojeniyi, AB Sulaimon IEEE 2nd International conference on Cyber space (CYBER NIGERIA)., 2021 | 2 | 2021 |
A Panacea to soft computing approach for Sinkhole attack classification in a wireless sensor networks environment KE Nwankwo, SM Abdulhamid, JA Ojeniyi, S Misra, J Oluranti, R Ahuja Futuristic Trends in Network and Communication Technologies: Third …, 2021 | 2 | 2021 |
Privacy Preservation in Mobile-Based Learning Systems: Current Trends, Methodologies, Challenges, Opportunities and Future Direction MK Muhammad, IO Oyefolahan, OM Olaniyi, OJ Adebayo Information and Communication Technology and Applications: Third …, 2021 | 2 | 2021 |