Showing
1 - 4
results of
4
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Dada, Kemi Victoria
Search Results - Dada, Kemi Victoria
Showing
1 - 4
results of
4
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems
by
Omolara, Abiodun Esther
,
Jantan, Aman
,
Isaac Abiodun, Oludare
,
Victoria Dada, Kemi
,
Arshad, Humaira
,
Emmanuel, Etuh
Published in
IEEE access
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
2
Loading…
State-of-the-art in artificial neural network applications: A survey
by
Abiodun, Oludare Isaac
,
Jantan, Aman
,
Omolara, Abiodun Esther
,
Dada, Kemi Victoria
,
Mohamed, Nachaat AbdElatif
,
Arshad, Humaira
Published in
Heliyon
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
3
Loading…
Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition
by
Abiodun, Oludare Isaac
,
Kiru, Muhammad Ubale
,
Jantan, Aman
,
Omolara, Abiodun Esther
,
Dada, Kemi Victoria
,
Umar, Abubakar Malah
,
Linus, Okafor Uchenwa
,
Arshad, Humaira
,
Kazaure, Abdullahi Aminu
,
Gana, Usman
Published in
IEEE access
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
4
Loading…
HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys
by
Esther Omolara, Abiodun
,
Jantan, Aman
,
Abiodun, Oludare Isaac
,
Arshad, Humaira
,
Dada, Kemi Victoria
,
Emmanuel, Etuh
Published in
Health informatics journal
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Peer Reviewed
4 results
4
Full Text
4 results
4
Format
Articles
4 results
4
Journal Title
Ieee Access
2 results
2
Health Informatics Journal
1 results
1
Heliyon
1 results
1
Subjects
Science & Technology
4 results
4
Computer Science
3 results
3
Attacker
2 results
2
Computer Science, Information Systems
2 results
2
Deception
2 results
2
Decoys
2 results
2
Encryption
2 results
2
Engineering
2 results
2
Engineering, Electrical & Electronic
2 results
2
Technology
2 results
2
Telecommunications
2 results
2
Adversary
1 results
1
Agriculture
1 results
1
Application To Pattern Recognition
1 results
1
Artificial Intelligence
1 results
1
Artificial Neural Networks
1 results
1
Brute-Force
1 results
1
Chat
1 results
1
Communication
1 results
1
Computational Modeling
1 results
1
Year of Publication
From:
To:
Source
Doaj Directory Of Open Access Journals
4 results
4
Ezb Free E-Journals
4 results
4
Road: Directory Of Open Access Scholarly Resources
3 results
3
Ieee Open Access Journals
2 results
2
Ieee Xplore (Online Service)
2 results
2
Ieee Xplore All Journals
2 results
2
Bacon - Elsevier - Global Sciencedirect-Openaccess
1 results
1
Sage Journals Gold Open Access 2024
1 results
1
Library & Information Science Abstracts (Lisa)
1 results
1
Sciencedirect Journals
1 results
1
Ingentaconnect Journals
1 results
1
Sage Deep Backfile 2012
1 results
1
Open Access: Pubmed Central
1 results
1