Network security in cloud computing with elliptic curve cryptography VO Waziri, J Ojeniyi Canadian Center of Science and Education, 2013 | 137 | 2013 |
Privacy and national security issues in social networks: the challenges SM Abdulhamid, S Ahmad, VO Waziri, FN Jibril arXiv preprint arXiv:1402.3301, 2014 | 43 | 2014 |
A conceptual Nigeria stock exchange prediction: implementation using support vector machines-SMO model SM Abubakar, I Audu, OW Victor, KR Adeboye World of Computer Science and Information Technology Journal (WCSIT), 2013 | 13 | 2013 |
Steganography and its applications in information dessimilation on the web using images as security embeddment: a wavelet approach VO Waziri, A Isah, A Ochoche, SM Abdulhamid International Journal of Computer and Information Technology (IJCIT), 2012 | 12 | 2012 |
Threat modeling of electronic health systems and mitigating countermeasures JK Alhassan, E Abba, OM Olaniyi, OV Waziri SICT FUTMINNA, 2016 | 10 | 2016 |
Assessment of Information Security Awareness among Online Banking Costumers in Nigeria M Olalere, OV Waziri, I Ismaila, OS Adebayo, O Ololade International Journal of Advanced Research in Computer Science and Software …, 2014 | 10 | 2014 |
Cyber crimes analysis based-on open source digital forensics tools OW Victor, NO Okongwu, I Audu, SA Olawale, MA Shafi’í International Journal of Computer Science and Information Security, 2013 | 10 | 2013 |
Control operator for the two-dimensional energized wave equation VO Waziri, SA REJU Leonardo Journal of Sciences 9, 33-44, 2006 | 10 | 2006 |
Optimal Control of Energized Wave equations using the Extended Conjugate Gradient Method (ECGM) VO Waziri Ph. D. Thesis, Federal University of Technology, Minna, Nigeria, 2004 | 10 | 2004 |
Stateful hash-based digital signature schemes for bitcoin cryptocurrency MD Noel, OV Waziri, MS Abdulhamid, AJ Ojeniyi 2019 15th International Conference on Electronics, Computer and Computation …, 2019 | 8 | 2019 |
Big data analytics and data security in the cloud via fully homomorphic encryption VO Waziri, JK Alhassan, I Ismaila, MD Noel International Journal of Computer, Control, Quantum and Information Engineering,, 2015 | 8 | 2015 |
Comparative Performance Analysis of Anti-virus Software NM Dogonyaro, WO Victor, AM Shafii, SL Obada Information and Communication Technology and Applications: Third …, 2021 | 5 | 2021 |
Comparative analysis of classical and post-quantum digital signature algorithms used in Bitcoin transactions MD Noel, OV Waziri, MS Abdulhamid, AJ Ojeniyi, MU Okoro 2020 2nd International Conference on Computer and Information Sciences …, 2020 | 5 | 2020 |
A forensic evidence recovery from mobile device applications JK Alhassan, A Gbolahan, I Idris, SM Abdulhamid, VO Waziri International Journal of Digital Enterprise Technology 1 (1-2), 79-95, 2018 | 5 | 2018 |
Extracting Android applications data for anomaly-based malware detection J Abah, VO Waziri, MB Abdullahi, OS Adewale, UA Ume Global Journals Inc.(USA), 2015 | 5 | 2015 |
Review and analysis of classical algorithms and hash-based post-quantum algorithm MD Noel, VO Waziri, SM Abdulhamid, JA Ojeniyi Journal of Reliable Intelligent Environments, 1-18, 2021 | 4 | 2021 |
A Secure Method to Hide Confidential Data Using Cryptography and Steganography A John K, I Ismaila, A Adamu International Conference on Information and Communication Technology and its …, 2016 | 4 | 2016 |
Data loss prevention and challenges faced in their deployments VO Waziri, I Ismaila, JK Alhassan, BO Adedayo International Conference on Information and Communication Technology and its …, 2016 | 4 | 2016 |
E-fraud forensics investigation techniques with formal concept analysis V Waziri, M Olalere, A Umar International Journal of Cyber-Security and Digital Forensics 3 (4), 235-245, 2014 | 4 | 2014 |
Big data analytics and the epitome of fully homomorphic encryption scheme for cloud computing security VO Waziri, JK Alhassan, M Olalere, I Ismaila | 4 | 2014 |