Follow
Victor Waziri
Victor Waziri
Verified email at futminna.edu.ng
Title
Cited by
Cited by
Year
Network security in cloud computing with elliptic curve cryptography
VO Waziri, J Ojeniyi
Canadian Center of Science and Education, 2013
1372013
Privacy and national security issues in social networks: the challenges
SM Abdulhamid, S Ahmad, VO Waziri, FN Jibril
arXiv preprint arXiv:1402.3301, 2014
432014
A conceptual Nigeria stock exchange prediction: implementation using support vector machines-SMO model
SM Abubakar, I Audu, OW Victor, KR Adeboye
World of Computer Science and Information Technology Journal (WCSIT), 2013
132013
Steganography and its applications in information dessimilation on the web using images as security embeddment: a wavelet approach
VO Waziri, A Isah, A Ochoche, SM Abdulhamid
International Journal of Computer and Information Technology (IJCIT), 2012
122012
Threat modeling of electronic health systems and mitigating countermeasures
JK Alhassan, E Abba, OM Olaniyi, OV Waziri
SICT FUTMINNA, 2016
102016
Assessment of Information Security Awareness among Online Banking Costumers in Nigeria
M Olalere, OV Waziri, I Ismaila, OS Adebayo, O Ololade
International Journal of Advanced Research in Computer Science and Software …, 2014
102014
Cyber crimes analysis based-on open source digital forensics tools
OW Victor, NO Okongwu, I Audu, SA Olawale, MA Shafi’í
International Journal of Computer Science and Information Security, 2013
102013
Control operator for the two-dimensional energized wave equation
VO Waziri, SA REJU
Leonardo Journal of Sciences 9, 33-44, 2006
102006
Optimal Control of Energized Wave equations using the Extended Conjugate Gradient Method (ECGM)
VO Waziri
Ph. D. Thesis, Federal University of Technology, Minna, Nigeria, 2004
102004
Stateful hash-based digital signature schemes for bitcoin cryptocurrency
MD Noel, OV Waziri, MS Abdulhamid, AJ Ojeniyi
2019 15th International Conference on Electronics, Computer and Computation …, 2019
82019
Big data analytics and data security in the cloud via fully homomorphic encryption
VO Waziri, JK Alhassan, I Ismaila, MD Noel
International Journal of Computer, Control, Quantum and Information Engineering,, 2015
82015
Comparative Performance Analysis of Anti-virus Software
NM Dogonyaro, WO Victor, AM Shafii, SL Obada
Information and Communication Technology and Applications: Third …, 2021
52021
Comparative analysis of classical and post-quantum digital signature algorithms used in Bitcoin transactions
MD Noel, OV Waziri, MS Abdulhamid, AJ Ojeniyi, MU Okoro
2020 2nd International Conference on Computer and Information Sciences …, 2020
52020
A forensic evidence recovery from mobile device applications
JK Alhassan, A Gbolahan, I Idris, SM Abdulhamid, VO Waziri
International Journal of Digital Enterprise Technology 1 (1-2), 79-95, 2018
52018
Extracting Android applications data for anomaly-based malware detection
J Abah, VO Waziri, MB Abdullahi, OS Adewale, UA Ume
Global Journals Inc.(USA), 2015
52015
Review and analysis of classical algorithms and hash-based post-quantum algorithm
MD Noel, VO Waziri, SM Abdulhamid, JA Ojeniyi
Journal of Reliable Intelligent Environments, 1-18, 2021
42021
A Secure Method to Hide Confidential Data Using Cryptography and Steganography
A John K, I Ismaila, A Adamu
International Conference on Information and Communication Technology and its …, 2016
42016
Data loss prevention and challenges faced in their deployments
VO Waziri, I Ismaila, JK Alhassan, BO Adedayo
International Conference on Information and Communication Technology and its …, 2016
42016
E-fraud forensics investigation techniques with formal concept analysis
V Waziri, M Olalere, A Umar
International Journal of Cyber-Security and Digital Forensics 3 (4), 235-245, 2014
42014
Big data analytics and the epitome of fully homomorphic encryption scheme for cloud computing security
VO Waziri, JK Alhassan, M Olalere, I Ismaila
42014
The system can't perform the operation now. Try again later.
Articles 1–20