VII.1-1 (A. T. Akinwale, F. T. Ibharalu) The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases
VII.2-7 (A. T. Akinwale, F. T. Ibharalu) Password Authentication Scheme with Secured Login Interface
X.2.12 (T. E. Akhigbe-Mudu, F. T. Ibharalu and O. Folorunso) Analysis of Network Packet Loss using Passive Measurement Technique Augumented with Parity-Check
XI.1-03 (T. E. Akhigbe-Mudu, F. T. Ibharalu and A.T. Akinwale) Analytical Technique For Visualizing Buffer Overflow Attacks Combined With Code Pointer Integrity Checking
XI.1-15 (T. E. Akhigbe-Mudu, F. T. Ibharalu) Network Management Control Based on Change of Self-Similarity and Fuzzy Logic in Network Traffic
|