Publication

 

Recent Submissions

  • Mohammed, Adamu Mustapha; Asante, Michael; Alornyo, Seth; Essah, Obo Bernard (Iran Journal of Computer Science, 2023)
    Currently, Android is the most widely used mobile operating system globally. This platform has become a target for malware activities due to its technological and user appeal, open-source code, and the possibility of ...
  • Anab, Solomon; Mensah, Godbless; Baagyere, Yellakuor Edward; Mohammed, Adamu Mustapha (International Journal for Multidisciplinary Research (IJFMR), 2024)
    From security systems to human-computer interaction, face recognition technology is a key component in many different applications. In this domain, the Local Binary Pattern Histogram (LBPH) algorithm has shown great ...
  • Mohammed, Adamu Mustapha; Alornyo, Seth; Asante, Michael; Essah, Obo Bernard (ADRRI JOURNAL OF ENGINEERING AND TECHNOLOGY, 202)
    IoT devices have fundamental security flaws that leave them open to a variety of security threats and attacks, including attacks from botnets. Therefore, creators of botnets continue to take advantage of the security ...