Victor Waziri
Victor Waziri
Verified email at futminna.edu.ng
Title
Cited by
Cited by
Year
Privacy and national security issues in social networks: the challenges
SM Abdulhamid, S Ahmad, VO Waziri, FN Jibril
arXiv preprint arXiv:1402.3301, 2014
292014
Steganography and its applications in information dessimilation on the web using images as securityembeddment: a wavelet approach
VO Waziri, A Isah, A Ochoche, SM Abulhamid
Int J Comput Inf Technol 1 (02), 194-202, 2012
112012
Optimal Control of Energized Wave equations using the Extended Conjugate Gradient Method (ECGM)
VO Waziri
Ph. D. Thesis, Federal Univ. of Technology, Minna, Nigeria, 2004
102004
A conceptual Nigeria stock exchange prediction: Implementation using Support Vector Machines-SMO model
SM Abubakar, I Audu, OW Victor, KR Adeboye
World of Computer Science and Information Technology Journal (WCSIT), 2013
82013
Threat modeling of electronic health systems and mitigating countermeasures
JK Alhassan, E Abba, OM Olaniyi, OV Waziri
SICT FUTMINNA, 2016
72016
Big data analytics and data security in the cloud via fully homomorphic encryption
VO Waziri, JK Alhassan, I Ismaila, MD Noel
International Journal of Computer, Control, Quantum and Information Engineering,, 2015
72015
Cyber crimes analysis based-on open source digital forensics tools
OW Victor, NO Okongwu, I Audu, SA Olawale, MA Shafi’Ý
International Journal of Computer Science and Information Security, 2013
72013
Control operator for the two-dimensional energized wave equation
VO Waziri, SA Reju
Leonardo Journal of Sciences 9, 33-44, 2006
72006
Control operator for the two-dimensional energized wave equation
VO Waziri, SA Reju
Leonardo Journal of Sciences 9, 33-44, 2006
72006
Extracting Android applications data for anomaly-based malware detection
J Abah, VO Waziri, MB Abdullahi, OS Adewale, UA Ume
Global Journals Inc.(USA), 2015
42015
Assessment of Information Security Awareness among Online Banking Costumers in Nigeria
M Olalere, VO Waziri, I Ismaila, OS Adebayo, O Olalode
42014
Big data analytics and the epitome of fully homomorphic encryption scheme for cloud computing security
OW Victor, KA John, M Olalere, I Ismaila
International Journal of Developments in Big Data and Analytics, 2014
42014
Information security on the communication network in Nigeria based on digital signature
OS Adebayo, VO Waziri, JO Ojeniyi, SA Bashir, A Mishra
International Journal of Computer Science and Information Security (IJCSIS), 2012
42012
The Analysis of the Two-dimensional Diffusion Equation With a Source
VO Waziri, SA Reju
Leonardo Electronic Journal of Practices and Technologies, 43-54, 2006
42006
The analytical solutions of the one-dimensional energy
VO Waziri, SA Reju
AU JT 10 (2), 120-4, 2006
32006
A Secure Method to Hide Confidential Data Using Cryptography and Steganography
JK Alhassan, I Ismaila, VO Waziri, A Abdulkadir
International Conference on Information and Communication Technology and Itsá…, 2016
22016
Securing file on cloud computing system using encryption software: a comparative analysis
VO Waziri, JK Alhassan, I Idris, RA Egigogo
International Conference on Information and Communication Technology and Itsá…, 2016
22016
Network security in cloud computing with elliptic curve cryptography
VO Waziri, OJ Adebayo, H Danladi, A Isah, AS Magaji, MB Abdullahi
Network and Communication Technologies 2 (2), 43, 2013
22013
A hierarchical cluster analysis and simulation of state capitals in Nigeria for tourism exploration
I Audu, A Usman, OW Victor
International Journal of Latest Research in Science and Technology, 2013
22013
Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency
MD Noel, OV Waziri, MS Abdulhamid, AJ Ojeniyi
2019 15th International Conference on Electronics, Computer and Computationá…, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20