Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Author
Title
Subject
Help
Sign on to:
My DSpace
Receive email
updates
Edit Profile
BHUDR: BINGHAM UNIVERSITY DIGITAL REPOSITORY
Search
Search:
All of DSpace
Faculty of Computing
Department of Cyber Security
Book Chapter
Books
Conference Papers
Inaugural Lectures
Master Thesis
Ph.D. Thesis
Research Articles
Seminars & Workshops
for
Current filters:
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Start a new search
Add filters:
Use filters to refine the search results.
Title
Author
Subject
Date Issued
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Results 1-2 of 2 (Search time: 0.001 seconds).
previous
1
next
Item hits:
Issue Date
Title
Author(s)
2019
Mitigating Advanced Persistent Threats: A Comparative Evaluation Review
Ajibola, Aminat
;
Adelaiye, Oluwasegun
;
Ujata, Innocent
;
Rahman, Noorihan Abdul
2019
Mitigating Advanced Persistent Threats Using A Combined Static-Rule And Machine Learning-Based Technique
ADELAIYE, Oluwasegun
Discover
Author
1
ADELAIYE, Oluwasegun
1
Adelaiye, Oluwasegun
1
Ajibola, Aminat
1
Rahman, Noorihan Abdul
1
Ujata, Innocent
Subject
1
cyber warfare
1
Intrusion detection
1
Packet capture
1
Phishing
1
social engineering
1
Traffic analysis