Victor Waziri
Victor Waziri
Verified email at futminna.edu.ng
TitleCited byYear
Privacy and national security issues in social networks: the challenges
SM Abdulhamid, S Ahmad, VO Waziri, FN Jibril
arXiv preprint arXiv:1402.3301, 2014
242014
Optimal Control of Energized Wave equations using the Extended Conjugate Gradient Method (ECGM)
VO Waziri
Ph. D. Thesis, Federal University of Technology, Minna, Nigeria, 2004
102004
A Conceptual Nigeria Stock Exchange Prediction: Implementation Using Support Vector Machines-SMO Model.
AS Magaji, VO Waziri, A Isah, KR Adeboye
World of Computer Science & Information Technology Journal 3 (4), 2013
82013
Steganography and its applications in information dessimilation on the web using images as securityembeddment: a wavelet approach
VO Waziri, A Isah, A Ochoche, SM Abulhamid
Int J Comput Inf Technol 1 (02), 194-202, 2012
72012
Control operator for the two-dimensional energized wave equation
VO Waziri, SA Reju
Leonardo Journal of Sciences 9, 33-44, 2006
72006
Control operator for the two-dimensional energized wave equation
VO Waziri, SA Reju
Leonardo Journal of Sciences 9, 33-44, 2006
72006
Big data analytics and data security in the cloud via fully homomorphic encryption
VO Waziri, JK Alhassan, I Ismaila, MN Dogonyaro
International Journal of Computer, Control, Quantum and Information …, 2015
62015
The Analysis of the Two-dimensional Diffusion Equation With a Source
VO Waziri, SA Reju
Leonardo Electronic Journal of Practices and Technologies, 43-54, 2006
42006
Big data analytics and the epitome of fully homomorphic encryption scheme for cloud computing security
VO WAZIRI, JK ALHASSAN, O Morufu, I Ismaila
International Journal of Developments in Big Data and Analytics Voolume 1, 19-40, 2014
32014
The analytical solutions of the one-dimensional energy
VO Waziri, SA Reju
AU JT 10 (2), 120-4, 2006
32006
Threat modeling of electronic health systems and mitigating countermeasures
JK Alhassan, E Abba, OM Olaniyi, VO Waziri
International Conference on Information and Communication Technology and Its …, 2016
22016
E-fraud forensics investigation techniques with formal concept analysis
V Waziri, M Olalere, A Umar
International Journal of Cyber-Security and Digital Forensics 3 (4), 235-245, 2014
22014
Network security in cloud computing with elliptic curve cryptography
VO Waziri, OJ Adebayo, H Danladi, A Isah, AS Magaji, MB Abdullahi
Network and Communication Technologies 2 (2), 43, 2013
22013
Securing file on cloud computing system using encryption software: a comparative analysis
VO Waziri, JK Alhassan, I Ismaila, RA Egigogo
International Conference on Information and Communication Technology and Its …, 2016
12016
Cyber Warfare and Terrorism based on Data Transmission through Classical Cryptographic and Steganographic Algorithms
VO Waziri, I Suleiman
International Journal of Computer Applications 112 (16), 2015
12015
The Application of Decidability Theory to Identify Similar Computer Networks.
SM Abdulhamid, VO Waziri, L Idris
IUP Journal of Computational Mathematics 4 (2), 2011
12011
The Application of Decidability Theory to Identify Similar Computer Networks
MA Shafi’i, VO Waziri, L Idris
12011
Penalty cost for one-dimensional energized wave equation
VO Waziri, A Sunday
Leonardo Journal of Sciences, 109-112, 2007
12007
The Penalty Cost Functional for the Two-dimensional Energized Wave Equation
VO Waziri, SA Reju
Leonardo Journal of Sciences, 45-52, 2006
12006
Privacy Preserving Classification over Encrypted Data Using Fully Homomorphic Encryption Technique
AM Jubrin, VO Waziri, MB Abdullahi, I Ismaila
i-Manager's Journal on Digital Signal Processing 6 (2), 36, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20