An improved caesar cipher (icc) algorithm O Abraham, GO Shefiu International Journal of Engineering Science & Advanced Technology [IJESAT], 2012 | 28 | 2012 |
A web based career guidance information system for pre-tertiary institution students in Nigeria OJ Abisoye O.A., Alabi I.O., Ganiyu S.O., Abisoye B.O International Journal of Scientific Research in Science, Engineering and …, 2015 | 19* | 2015 |
Characterising risk factors and countermeasures for risk evaluation of bring your own device strategy SO Ganiyu, RG Jimoh International Journal of Information Security Science 7 (1), 49-59, 2018 | 15 | 2018 |
An enhanced ATM security system using second-level authentication BL Muhammad-Bello, ME Alhassan, SO Ganiyu International Journal of Computer Applications, 2015 | 15 | 2015 |
Practical approach to urban crime prevention in developing nations RA Ikuesan, SO Ganiyu, MU Majigi, YD Opaluwa, HS Venter Proceedings of the 3rd International Conference on Networking, Information …, 2020 | 12 | 2020 |
Extended risk-based context-aware model for dynamic access control in bring your own device strategy SO Ganiyu, RG Jimoh Machine Learning and Data Mining for Emerging Trend in Cyber Dynamics …, 2021 | 6 | 2021 |
Development of secure electronic cybercrime cases database system for the judiciary OS Adebayo, JB Micah, GS Olusegun, IO Alabi, L Abdulazeez International Journal of Information Engineering and Electronic Business 14 …, 2022 | 4 | 2022 |
Data Privacy System Using Steganography and Cryptography OS Adebayo, SO Ganiyu, FB Osang, SA Salawu, K Mustapha, ... Mathematical Sciences and Computing, MECS, 2022 | 4 | 2022 |
Digital Forensic analysis for enhancing information security OJ Adebayo, I Suleiman, AY Ade, SO Ganiyu, IO Alabi 2015 International Conference on Cyberspace (CYBER-Abuja), 38-44, 2015 | 4 | 2015 |
Voice Recognition Systems for The Disabled Electorate: Critical Review on Architectures and Authentication Strategies. OM Olaniyi, JA Bala, S Ganiyu, YS Abdulsalam, CE Eke Computer Engineering & Applications Journal 12 (2), 2023 | 3 | 2023 |
Two-layer Secured Graphical Authentication with One Time Password (OTP) Verification for a Web Based Applications OS Adebayo, SO Ganiyu, AA Alli, SA Rufai, AM Jubril, L Abdulazeez, ... KIRINYAGA UNIVERSITY 6 TH ANNUAL INTERNATIONAL CONFERENCE, 2023 MARCH 22ND …, 2023 | 3 | 2023 |
Digital twin framework for holistic and prognostic analysis of the Nigerian electricity supply industry: A proposal HO Aliyu, SO Ganiyu, IO Oyefolahan, I Djitog 2021 Conference on Information Communications Technology and Society (ICTAS …, 2021 | 3 | 2021 |
Systematic review of facia recognition algorithms and approaches for crime investigations SO Ganiyu, MO Olaniyi, OS Adebayo, TD Akpagher International Journal of Information Processing and Communication, 2020 | 3 | 2020 |
Intelligent Video Surveillance Systems: A Survey O Olaniyi, S Ganiyuo, S Akam Balkan Journal of Electrical and Computer Engineering (BAJECE) 1 (1), 57-53, 2023 | 2 | 2023 |
A Literature Survey on IoT Botnet Detection Techniques M Umar, OA Abisoye, SO Ganiyu 4th International Conference on Information Technology in Education and …, 2021 | 2 | 2021 |
The prospect of addressing property management challenges with information and communication technology (ICT): A survey of Minna Metropolis, Niger State VJ Ganiyu, S.O., Essien, C.F., Alabi, I.O., Ukam the 1st International Conference on ICT for National Development and Its …, 2018 | 2 | 2018 |
Analysis and classification of some selected media apps vulnerability OS Adebayo, JS Anyam, S Ganiyu, SA Salawu International Conference on Information and Communication Technology and …, 2020 | 1 | 2020 |
A Systematic Review of Background Subtraction Algorithms for Smart Surveillance System M Olaniyi, JA Bala, SO Ganiyu, PE Wisdom vol 8, 35-54, 2020 | 1 | 2020 |
Securing Electronic Health Record System Using Cryptographic Techniques SO Ganiyu, OM Olaniyi, T Orooniyi | 1 | 2019 |
A Framework for Physical Home Security using Mobile Intrusion Detection System SO Ganiyu, A Ismail, JA Ojeniyi, T Adediran i-Manager's Journal on Wireless Communication Networks 7 (3), 1, 2018 | 1 | 2018 |