Victor Waziri
Victor Waziri
Verified email at futminna.edu.ng
Title
Cited by
Cited by
Year
Privacy and national security issues in social networks: the challenges
SM Abdulhamid, S Ahmad, VO Waziri, FN Jibril
arXiv preprint arXiv:1402.3301, 2014
252014
Optimal Control of Energized Wave equations using the Extended Conjugate Gradient Method (ECGM)
VO Waziri
Ph. D. Thesis, Federal University of Technology, Minna, Nigeria, 2004
102004
A Conceptual Nigeria Stock Exchange Prediction: Implementation Using Support Vector Machines-SMO Model.
AS Magaji, VO Waziri, A Isah, KR Adeboye
World of Computer Science & Information Technology Journal 3 (4), 2013
82013
Steganography and its applications in information dessimilation on the web using images as securityembeddment: a wavelet approach
VO Waziri, A Isah, A Ochoche, SM Abulhamid
Int J Comput Inf Technol 1 (02), 194-202, 2012
72012
Control operator for the two-dimensional energized wave equation
VO Waziri, SA Reju
Leonardo Journal of Sciences 9, 33-44, 2006
72006
Control operator for the two-dimensional energized wave equation
VO Waziri, SA Reju
Leonardo Journal of Sciences 9, 33-44, 2006
72006
Big data analytics and data security in the cloud via fully homomorphic encryption
VO Waziri, JK Alhassan, I Ismaila, MN Dogonyaro
International Journal of Computer, Control, Quantum and Information …, 2015
62015
The Analysis of the Two-dimensional Diffusion Equation With a Source
VO Waziri, SA Reju
Leonardo Electronic Journal of Practices and Technologies, 43-54, 2006
42006
Threat modeling of electronic health systems and mitigating countermeasures
JK Alhassan, E Abba, OM Olaniyi, VO Waziri
International Conference on Information and Communication Technology and Its …, 2016
32016
Big data analytics and the epitome of fully homomorphic encryption scheme for cloud computing security
VO Waziri, JK Alhassan, O Morufu, I Ismaila
International Journal of Developments in Big Data and Analytics Voolume 1, 19-40, 2014
32014
The analytical solutions of the one-dimensional energy
VO Waziri, SA Reju
AU JT 10 (2), 120-4, 2006
32006
E-fraud forensics investigation techniques with formal concept analysis
V Waziri, M Olalere, A Umar
International Journal of Cyber-Security and Digital Forensics 3 (4), 235-245, 2014
22014
Network security in cloud computing with elliptic curve cryptography
VO Waziri, OJ Adebayo, H Danladi, A Isah, AS Magaji, MB Abdullahi
Network and Communication Technologies 2 (2), 43, 2013
22013
A forensic evidence recovery from mobile device applications
JK Alhassan, A Gbolahan, I Idris, SM Abdulhamid, VO Waziri
International Journal of Digital Enterprise Technology 1 (1-2), 79-95, 2018
12018
A Secure Method to Hide Confidential Data Using Cryptography and Steganography
JK Alhassan, I Ismaila, VO Waziri, A Abdulkadir
Federal University of Technology, Minna, Nigeria November, 28-30, 2016
12016
Securing file on cloud computing system using encryption software: a comparative analysis
VO Waziri, JK Alhassan, I Idris, RA Egigogo
International Conference on Information and Communication Technology and Its …, 2016
12016
Cyber Warfare and Terrorism based on Data Transmission through Classical Cryptographic and Steganographic Algorithms
VO Waziri, I Suleiman
International Journal of Computer Applications 112 (16), 2015
12015
A Generic Prediction of Nigeria Stock Exchange Market, Implementation Using Naive Bayes Model
VO Waziri
12013
The Application of Decidability Theory to Identify Similar Computer Networks.
SM Abdulhamid, VO Waziri, L Idris
IUP Journal of Computational Mathematics 4 (2), 2011
12011
The Application of Decidability Theory to Identify Similar Computer Networks
MA Shafi’i, VO Waziri, L Idris
12011
The system can't perform the operation now. Try again later.
Articles 1–20