Comparative analysis between first-come-first-serve (FCFS) and shortest-job-first (SJF) scheduling algorithms GD Bibu, GC Nwankwo International Journal of Computer Science and Mobile Computing, 2019 | 9 | 2019 |
Modelling organisations as electronic institutions GD Bibu International Journal of Scientific & Technology Research, 2019 | 4 | 2019 |
Identifying recovery patterns from resource usage data of cluster systems N Gurumdimma, GD Bibu, DB Bisandu, MT Alams Science World Journal 13 (4), 87-94, 2018 | 3 | 2018 |
System security requirements analysis with answer set programming G Bibu, N Yoshioka, J Padget 2012 Second IEEE International Workshop on Requirements Engineering for …, 2012 | 3 | 2012 |
Mobile-Based Python Tutor for High School Students L Micah, GD Bibu International Journal of Computer Science and Mobile Computing, 2019 | 2 | 2019 |
Security in the context of multi-agent systems GD Bibu The 10th International Conference on Autonomous Agents and Multiagent …, 2011 | 2 | 2011 |
CBT Plugin: Towards Inclusive Computer-Based Testing for the Visually Impaired DO Osewa, GD Bibu International Journal of Contemporary Applied Researches, 2019 | 1 | 2019 |
Computational verification of security requirements GD Bibu University of Bath, 2013 | | 2013 |
Security Requirements Analysis and Validation with Misuse Cases and Institutional Modelling GD Bibu, N Yoshioka, J Padget Center for Global Research in Advanced Software Science and Engineering …, 2012 | | 2012 |
Implementation of a data and computer security application GD Bibu, BB Chukwuemeka Science World Journal 4 (2), 2009 | | 2009 |
Application of elliptic curve cryptography on data encryption over a network GD Bibu, S Angai Science World Journal 3 (4), 2008 | | 2008 |
Security Policy Verification for Internal Information Security Threats using Answer Set Programming G Bibu, J Padget | | |
ANALYSING SECURITY REQUIREMENTS WITH MISUSE CASES AND ANSWER SET PROGRAMMING GD Bibu, N Yoshioka | | |