Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Mary Ogbuka Kenneth"'
Publikováno v:
Journal of Computer Science Research. 3:29-41
Alphanumerical usernames and passwords are the most used computer authentication technique. This approach has been found to have a number of disadvantages. Users, for example, frequently choose passwords that are simple to guess. On the other side, i
Publikováno v:
Journal of Computer Science Research. 3:16-28
Features in educational data are ambiguous which leads to noisy features and curse of dimensionality problems. These problems are solved via feature selection. There are existing models for features selection. These models were created using either a
Publikováno v:
Illumination of Artificial Intelligence in Cybersecurity and Forensics ISBN: 9783030934521
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::38f060b3f58023d8bbee5a645e60e7cb
https://doi.org/10.1007/978-3-030-93453-8_7
https://doi.org/10.1007/978-3-030-93453-8_7
Autor:
Mary Ogbuka Kenneth, Sulaimon Bashir
Publikováno v:
Illumination of Artificial Intelligence in Cybersecurity and Forensics ISBN: 9783030934521
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::38f86a2afde73576f9cf7b98fce039e4
https://doi.org/10.1007/978-3-030-93453-8_8
https://doi.org/10.1007/978-3-030-93453-8_8
Autor:
Abdulmalik Danlami Mohammed, Moses Folorunsho Victor, Mary Ogbuka Kenneth, Oluwaseun A. Ojerinde
Publikováno v:
i-manager's Journal on Information Technology. 9:1
Autor:
MOHAMMED, ABDULMALIK DANLAMI, OJERINDE, OLUWASEUN A., VICTOR, MOSES FOLORUNSHO, KENNETH, MARY OGBUKA
Publikováno v:
i-Manager's Journal on Information Technology; Mar-May2020, Vol. 9 Issue 2, p1-11, 11p
Autor:
Sanjay Misra, Chamundeswari Arumugam
This book covers a variety of topics that span from industry to academics: hybrid AI model for IDS in IoT, intelligent authentication framework for IoMT mobile devices for extracting bioelectrical signals, security audit in terms of vulnerability ana