Follow
Joshua Tom, PhD
Joshua Tom, PhD
Elizade University, Ilara Mokin - Nigeria
Verified email at elizadeuniversity.edu.ng
Title
Cited by
Cited by
Year
A neuro-fussy based model for diagnosis of monkeypox diseases
JJ Tom, NP Anebo
International Journal of Computer Science Trends and Technology (IJCST), 2018
212018
Cyberspace: Mitigating Against Cyber security threats and attacks
JJ Tom, AG Akpan
International Journal of Engineering Research & Technology 11 (11), 327 - 332, 2022
32022
A Prediction Model for Information Diffusion in Online Social Network
JK Omoniyi, F Adedeji, JJ Tom
International Journal of Computer Applications 174 (27), 1-10, 2021
12021
Automated Model for Data Protection Regulation Compliance Monitoring and Enforcement
J Tom, W Adigwe, N Anebo, O Bukola
International Journal of Computing, Intelligence and Security Research 2 (1 …, 2023
2023
Design Framework of Cyber Security Solutions to Threats and Attacks on Critical Infrastructure of Electricity Power Systems of Nigeria Companies.
JJT Idris Ismaila, Ilyas Adeleke, Andrew Anogie Uduimoh
International Journal of Computing, 2, 2023
2023
Software Police: An Expert System that Detect, Investigate And Report Plagiarism on the Internet.
JJTNCL Chinwe. G. Ezekwe, Njideka N. Mbeledogu
International European Extended Enablement in Science, Engineering …, 2023
2023
Automated Cover Text-based Linguistic Steganographic Model Using LSTM and Huffman Coding
GNO Joshua J. Tom, Bukola A. Onyekwelu, Adigwe Wilfred, Folasade M. Aliu
International Research Journal of Engineering and Technology (IRJET) 10 (12 …, 2023
2023
Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems
REE Joshua J. Tom, Nlerum P. Anebo, Bukola A. Onyekwelu, Adigwe Wilfred
International Journal of Engineering and Advanced Technology (IJEAT) 12 (5 …, 2023
2023
Tackling Crime through the Design of an Enhanced Crime Mapping System
JJT Abasiama G. Akpan, Fergus U. Onu
4th Annual Scientific Conference of the Nigerian Academy of Science. Theme …, 2023
2023
A Cancelable Biometric Based Security Protocol for Online Banking System
JJ Tom, BK Alese, AF Thompson
International Journal of Computer Science and Information Security, 2020
2020
Resource Allocation Management in LTE System Using Prioritized Deficit Round Robin (DDR) Scheduling Algorithm
BM Kuboye, O Adebayo, JJ Tom
International Journal of Scientific & Engineering Research 9 (2), 1124-1131, 2018
2018
Efficient Anonymous Key Exchange Protocol for Roaming in Wireless Networks
JJ Tom, BK Alese, OS Adewale, AF Thompson
International Journal of Scientific Research Engineering &Technology 7 (2 …, 2018
2018
Performance and Security of Group Signature in Wireless Networks
JJ Tom, BK Alese, AF Thompson, NP Anebo
International Journal of Computer 29 (1), 82-98, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–13