A neuro-fussy based model for diagnosis of monkeypox diseases JJ Tom, NP Anebo International Journal of Computer Science Trends and Technology (IJCST), 2018 | 21 | 2018 |
Cyberspace: Mitigating Against Cyber security threats and attacks JJ Tom, AG Akpan International Journal of Engineering Research & Technology 11 (11), 327 - 332, 2022 | 3 | 2022 |
A Prediction Model for Information Diffusion in Online Social Network JK Omoniyi, F Adedeji, JJ Tom International Journal of Computer Applications 174 (27), 1-10, 2021 | 1 | 2021 |
Automated Model for Data Protection Regulation Compliance Monitoring and Enforcement J Tom, W Adigwe, N Anebo, O Bukola International Journal of Computing, Intelligence and Security Research 2 (1 …, 2023 | | 2023 |
Design Framework of Cyber Security Solutions to Threats and Attacks on Critical Infrastructure of Electricity Power Systems of Nigeria Companies. JJT Idris Ismaila, Ilyas Adeleke, Andrew Anogie Uduimoh International Journal of Computing, 2, 2023 | | 2023 |
Software Police: An Expert System that Detect, Investigate And Report Plagiarism on the Internet. JJTNCL Chinwe. G. Ezekwe, Njideka N. Mbeledogu International European Extended Enablement in Science, Engineering …, 2023 | | 2023 |
Automated Cover Text-based Linguistic Steganographic Model Using LSTM and Huffman Coding GNO Joshua J. Tom, Bukola A. Onyekwelu, Adigwe Wilfred, Folasade M. Aliu International Research Journal of Engineering and Technology (IRJET) 10 (12 …, 2023 | | 2023 |
Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems REE Joshua J. Tom, Nlerum P. Anebo, Bukola A. Onyekwelu, Adigwe Wilfred International Journal of Engineering and Advanced Technology (IJEAT) 12 (5 …, 2023 | | 2023 |
Tackling Crime through the Design of an Enhanced Crime Mapping System JJT Abasiama G. Akpan, Fergus U. Onu 4th Annual Scientific Conference of the Nigerian Academy of Science. Theme …, 2023 | | 2023 |
A Cancelable Biometric Based Security Protocol for Online Banking System JJ Tom, BK Alese, AF Thompson International Journal of Computer Science and Information Security, 2020 | | 2020 |
Resource Allocation Management in LTE System Using Prioritized Deficit Round Robin (DDR) Scheduling Algorithm BM Kuboye, O Adebayo, JJ Tom International Journal of Scientific & Engineering Research 9 (2), 1124-1131, 2018 | | 2018 |
Efficient Anonymous Key Exchange Protocol for Roaming in Wireless Networks JJ Tom, BK Alese, OS Adewale, AF Thompson International Journal of Scientific Research Engineering &Technology 7 (2 …, 2018 | | 2018 |
Performance and Security of Group Signature in Wireless Networks JJ Tom, BK Alese, AF Thompson, NP Anebo International Journal of Computer 29 (1), 82-98, 2018 | | 2018 |