Evaluating advanced persistent threats mitigation effects: a review OI Adelaiye, A Showole, SA Faki International Journal of Information Security Science 7 (4), 159-171, 2018 | 17 | 2018 |
Privacy Concerns in Biometrics FAS Ebelogu Christopher U, Amujo Oluyemi E, Oluwasegun Adalaiye I IEEE-SEM 10 (7), 2019 | 8 | 2019 |
Implementing Personnel Management System as SaaS M Yusuf, FA Silas, S Haruna Circulation in Computer Science 3 (5), 1-6, 2018 | 2 | 2018 |
Empirical Performance of Internal Sorting Algorithm F Silas, Y Musa, S Joyce British Journal of Mathematics & Computer Science 20 (1), 1-9, 2017 | 1 | 2017 |
Hybridization of class responsibility collaborators model (HCRCM) with function point to enhance project estimation cost in agile software development FA Silas, M Yusuf, AH Bijik Circulation in Computer Science 2 (6), 20-24, 2017 | 1 | 2017 |
Honey Algorithm for Securing and Identifying Hackers in a Pervasive Environment IOA Ageebee Silas FAKI, Musa Yusuf Nile Journal of Communication and Computer Science 5 (1), 2-9, 2023 | | 2023 |
Intelligence Gathering and Surveillance: First Phase for Attack Preparation AS Faki Cybersecurity Forum and Workshop, 2023 | | 2023 |
Users Knowledge on Awareness of Health Implications of Energy Emitted from ICT Devices I Uchenna, FA Silas | | 2018 |
ENHANCING ATM CARD SECURITY USING 2-FACTOR AUTHENTICATION BY HASHING CUSTOMERS DEVICE ATTRIBUTES. FA Silas, IY Aliyu, BJ Peter International Journal of Computing & ICT Research 11 (2), 2017 | | 2017 |
Abuse of Unified Modeling Language Diagrams in Software Development MP Ogedebe, FA Silas British Journal of Mathematics & Computer Science 10 (1), 1-9, 2015 | | 2015 |
Adaptation Mechanism for Managing Grid Resources DR Aremu, FA Silas | | |