Follow
Gideon Bibu
Title
Cited by
Cited by
Year
Comparative analysis between first-come-first-serve (FCFS) and shortest-job-first (SJF) scheduling algorithms
GD Bibu, GC Nwankwo
International Journal of Computer Science and Mobile Computing, 2019
92019
Modelling organisations as electronic institutions
GD Bibu
International Journal of Scientific & Technology Research, 2019
42019
Identifying recovery patterns from resource usage data of cluster systems
N Gurumdimma, GD Bibu, DB Bisandu, MT Alams
Science World Journal 13 (4), 87-94, 2018
32018
System security requirements analysis with answer set programming
G Bibu, N Yoshioka, J Padget
2012 Second IEEE International Workshop on Requirements Engineering for …, 2012
32012
Mobile-Based Python Tutor for High School Students
L Micah, GD Bibu
International Journal of Computer Science and Mobile Computing, 2019
22019
Security in the context of multi-agent systems
GD Bibu
The 10th International Conference on Autonomous Agents and Multiagent …, 2011
22011
CBT Plugin: Towards Inclusive Computer-Based Testing for the Visually Impaired
DO Osewa, GD Bibu
International Journal of Contemporary Applied Researches, 2019
12019
Computational verification of security requirements
GD Bibu
University of Bath, 2013
2013
Security Requirements Analysis and Validation with Misuse Cases and Institutional Modelling
GD Bibu, N Yoshioka, J Padget
Center for Global Research in Advanced Software Science and Engineering …, 2012
2012
Implementation of a data and computer security application
GD Bibu, BB Chukwuemeka
Science World Journal 4 (2), 2009
2009
Application of elliptic curve cryptography on data encryption over a network
GD Bibu, S Angai
Science World Journal 3 (4), 2008
2008
Security Policy Verification for Internal Information Security Threats using Answer Set Programming
G Bibu, J Padget
ANALYSING SECURITY REQUIREMENTS WITH MISUSE CASES AND ANSWER SET PROGRAMMING
GD Bibu, N Yoshioka
The system can't perform the operation now. Try again later.
Articles 1–13