Mikail Olayemi Olaniyi
Orcid: 0000-0002-2294-5545Affiliations:
- Federal University of Technology Minna, Niger State, Nigeria
According to our database1,
Mikail Olayemi Olaniyi
authored at least 16 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2014
2016
2018
2020
2022
2024
0
1
2
3
4
1
1
2
2
1
2
3
2
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Blockchain for securing electronic voting systems: a survey of architectures, trends, solutions, and challenges.
Clust. Comput., April, 2025
2024
DDOS attack detection in SDN: Method of attacks, detection techniques, challenges and research gaps.
Comput. Secur., 2024
2022
Frontiers Blockchain, July, 2022
Artificial Intelligence for Demystifying Blockchain Technology Challenges: A Survey of Recent Advances.
Frontiers Blockchain, July, 2022
2021
Blockchain technology in IoT systems: current trends, methodology, problems, applications, and future directions.
J. Reliab. Intell. Environ., 2021
Electron. Gov. an Int. J., 2021
2020
Privacy Preservation in Mobile-Based Learning Systems: Current Trends, Methodologies, Challenges, Opportunities and Future Direction.
Proceedings of the Information and Communication Technology and Applications, 2020
Sooner Lightweight Cryptosystem: Towards Privacy Preservation of Resource-Constrained Devices.
Proceedings of the Information and Communication Technology and Applications, 2020
Pastoralist Optimization Algorithm (POA): A Culture-Inspired Metaheuristic for Uncapacitated Facility Location Problem (UFLP).
Proceedings of the Hybrid Intelligent Systems, 2020
2018
Enhanced tiny encryption algorithm for secure electronic health authentication system.
Int. J. Inf. Priv. Secur. Integr., 2018
2016
Proceedings of the 2nd International Conference on Computing Research and Innovations, 2016
Towards a Fully Cooperative Multi-Agent Reinforcement Learning based Media Access Control Protocol for Underwater Acoustic Wireless Sensor Networks.
Proceedings of the 2nd International Conference on Computing Research and Innovations, 2016
2015
Implementing generic security requirements in e-voting using modified stegano-cryptographic approach.
Int. J. Inf. Comput. Secur., 2015
A Secure Electronic Prescription System Using Steganography with Encryption Key Implementation.
CoRR, 2015
2014
A Two-Way Loop Algorithm for Exploiting Instruction-Level Parallelism in Memory System.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014
Proceedings of the Global Summit on Computer & Information Technology, 2014