Articles:
- A Critical Review of Attack Prevention Approaches on Critical Information Infrastructure – Adejimi, A. O. Sodiya, A. S. Emmanuel, J. A., Onashoga, S. A. Ojesanmi, O. J.
- A Framework for Participatory E-Governance System – Sodiya A.S, Emmanuel J.A., Mustapha A.M, Odeniyi O. Y, Adegboyega A.A
- A Hybrid Cryptographic Algorithm For Data Storage Security – Aminu Auwal Sani, Muhammad Sirajo Aliyu
- An Intelligent Incidence Reporting System For Online Attacks – Monsuru O. Abdullahi, Adesina S. Sodiya, Adebukola S. Onashoga, C. O. Tinubu
- Data Mining Technique For Early Detection Of At-Risk Students – Oladapo, Kayode Abiodun, Adedokun, Adewale
- Detection Of Web Phishing Attacks Using Deep Belief Network Algorithm – C.C.Chigozie-Okwum, I.A. Ajah.
- Random Forest Based Feature Ranking and Selection in Melanoma Recognition –Suleiman Mustafa, Kola Oyeniran, Abdullahi Aliyu Danlami
- The Challenges of Big Data Application in Road Transport Management Service in Nigeria –Ajao, Joseph Oluwatosin
- Towards Bridging the Gap between SQL and NoSQL in Database Management Technologies – GarbaMuhammad, Muhammad Sirajo Aliyu, Ahmad Abubakar Aliero
- An Enhanced Pattern-based Detection of Computer Virus – Oluwumi E.O., Sodiya A.S, Onashoga S.A, Chima A.O, Emmanmuel J.A.