Mikail Olayemi Olaniyi
Orcid: 0000-0002-2294-5545Affiliations:
- Federal University of Technology Minna, Niger State, Nigeria
According to our database1,
Mikail Olayemi Olaniyi
authored at least 15 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
DDOS attack detection in SDN: Method of attacks, detection techniques, challenges and research gaps.
Comput. Secur., 2024
2022
Frontiers Blockchain, July, 2022
Artificial Intelligence for Demystifying Blockchain Technology Challenges: A Survey of Recent Advances.
Frontiers Blockchain, July, 2022
2021
Blockchain technology in IoT systems: current trends, methodology, problems, applications, and future directions.
J. Reliab. Intell. Environ., 2021
Electron. Gov. an Int. J., 2021
2020
Privacy Preservation in Mobile-Based Learning Systems: Current Trends, Methodologies, Challenges, Opportunities and Future Direction.
Proceedings of the Information and Communication Technology and Applications, 2020
Sooner Lightweight Cryptosystem: Towards Privacy Preservation of Resource-Constrained Devices.
Proceedings of the Information and Communication Technology and Applications, 2020
Pastoralist Optimization Algorithm (POA): A Culture-Inspired Metaheuristic for Uncapacitated Facility Location Problem (UFLP).
Proceedings of the Hybrid Intelligent Systems, 2020
2018
Enhanced tiny encryption algorithm for secure electronic health authentication system.
Int. J. Inf. Priv. Secur. Integr., 2018
2016
Proceedings of the 2nd International Conference on Computing Research and Innovations, 2016
Towards a Fully Cooperative Multi-Agent Reinforcement Learning based Media Access Control Protocol for Underwater Acoustic Wireless Sensor Networks.
Proceedings of the 2nd International Conference on Computing Research and Innovations, 2016
2015
Implementing generic security requirements in e-voting using modified stegano-cryptographic approach.
Int. J. Inf. Comput. Secur., 2015
A Secure Electronic Prescription System Using Steganography with Encryption Key Implementation.
CoRR, 2015
2014
A Two-Way Loop Algorithm for Exploiting Instruction-Level Parallelism in Memory System.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014
Proceedings of the Global Summit on Computer & Information Technology, 2014