Dr. John K. Alhassan
Title
Cited by
Cited by
Year
A decision tree approach for predicting students academic performance
KD Kolo, SA Adepoju, JK Alhassan
International Journal of Education and Management Engineering 5 (5), 12, 2015
392015
A Decision Tree Approach for Predicting Students Academic Performance.
JKA Kolo David Kolo, Solomon A. Adepoju
International Journal of Education and Management Engineering, (IJEME) 5 (5 …, 2015
39*2015
Using a weightless neural network to forecast stock prices: A case study of Nigerian stock exchange
JK Alhassan, S Misra
Scientific Research and Essays 6 (14), 2934-2940, 2011
142011
An evaluation of Internet connectivity of information technology firms in Minna Metropolis
JK Alhassan, SA Adepoju
Information Technologist (The) 4 (1), 96-103, 2007
142007
Comparative analysis of classification algorithms for email spam detection
M Shuaib, O Osho, I Ismaila, JK Alhassan
International Journal of Computer Network and Information Security 10 (1), 60, 2018
122018
Analytical Study of Some Selected Classification Algorithms in WEKA Using Real Crime Data.
JA Obuandike Georgina N., Audu Isah
International Journal of Advanced Research in Artificial Intelligence …, 2015
82015
Ensemble learning approach for the enhancement of performance of intrusion detection system
MD Abdulrahaman, JK Alhassan
International Conference on Information and Communication Technology and its …, 2018
72018
Comparative Study of Inflation Rates Forecasting Using Feed-Forward Artificial Neural Networks and Auto Regressive (AR) Models.
SAA Bayo Mohammed Onimude, John Kolo Alhassan
International Journal of Computer Science Issues (IJCSI) 12 (2), 260-266, 2015
72015
Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms
AM Maigida, M Olalere, JK Alhassan, H Chiroma, EG Dada
Journal of Reliable Intelligent Environments 5 (2), 67-89, 2019
62019
Big data analytics and data security in the cloud via fully homomorphic encryption
VO Waziri, JK Alhassan, I Ismaila, MN Dogonyaro
International Journal of Computer, Control, Quantum and Information …, 2015
62015
A fuzzy classifier-based penetration testing for web applications
JK Alhassan, S Misra, A Umar, R Maskeliūnas, R Damaševičius, ...
International Conference on Information Theoretic Security, 95-104, 2018
52018
Whale optimization algorithm-based email spam feature selection method using rotation forest algorithm for classification
M Shuaib, OS Adebayo, O Osho, I Idris, JK Alhassan, N Rana
SN Applied Sciences 1 (5), 390, 2019
42019
An Energy-Efficient and Robust Voltage Level Converter for Nanoelectronics
B Alidoosti, MH Moaiyeri
International Journal of Modern Education and Computer Science (IJMECS) 7 (5), 2015
42015
Threat Modeling of Electronic Health Systems and Mitigating Countermeasures.
VOW John K. Alhassan, Emmanuel Abba, O. M. Olaniyi
International Conference on Information and Communication Technology and its …, 2016
3*2016
Big data analytics and the epitome of fully homomorphic encryption scheme for cloud computing security
VO Waziri, JK Alhassan, O Morufu, I Ismaila
International Journal of Developments in Big Data and Analytics Voolume 1, 19-40, 2014
32014
Comparative evaluation of mobile forensic tools
JK Alhassan, RT Oguntoye, S Misra, A Adewumi, R Maskeliūnas, ...
International Conference on Information Theoretic Security, 105-114, 2018
22018
Forensic Acquisition of Data from a Crypt 12 Encrypted Database of Whatsapp
JK Alhassan, B Abubakar, M Olalere, SM Abdulhamid, S Ahmad
2nd International Engineering Conference (IEC 2017), 2017
22017
A Secure Method to Hide Confidential Data Using Cryptography and Steganography.
AA John K. Alhassan, Idris Ismaila, Victor O. Waziri
International Conference on Information and Communication Technology and its …, 2016
2*2016
Using data mining technique for scholarship disbursement
JK Alhassan, SA Lawal
Int. J. Inf. Commun. Eng 9, 1511-1514, 2015
22015
Effective Networking Model for Efficient Implementation of E-Governance: A Case Study of Nigeria
LO Osho, MB Abdullahi, O Osho, JK Alhassan
International Journal of Information Engineering and Electronic Business 7 …, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20