Mikail Olayemi Olaniyi

Orcid: 0000-0002-2294-5545

Affiliations:
  • Federal University of Technology Minna, Niger State, Nigeria


According to our database1, Mikail Olayemi Olaniyi authored at least 15 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DDOS attack detection in SDN: Method of attacks, detection techniques, challenges and research gaps.
Comput. Secur., 2024

2022
Paillier Cryptosystem Based ChainNode for Secure Electronic Voting.
Frontiers Blockchain, July, 2022

Artificial Intelligence for Demystifying Blockchain Technology Challenges: A Survey of Recent Advances.
Frontiers Blockchain, July, 2022

2021
Blockchain technology in IoT systems: current trends, methodology, problems, applications, and future directions.
J. Reliab. Intell. Environ., 2021

Multifactor authentication technique for a secure electronic voting system.
Electron. Gov. an Int. J., 2021

2020
Privacy Preservation in Mobile-Based Learning Systems: Current Trends, Methodologies, Challenges, Opportunities and Future Direction.
Proceedings of the Information and Communication Technology and Applications, 2020

Sooner Lightweight Cryptosystem: Towards Privacy Preservation of Resource-Constrained Devices.
Proceedings of the Information and Communication Technology and Applications, 2020

Pastoralist Optimization Algorithm (POA): A Culture-Inspired Metaheuristic for Uncapacitated Facility Location Problem (UFLP).
Proceedings of the Hybrid Intelligent Systems, 2020

2018
Enhanced tiny encryption algorithm for secure electronic health authentication system.
Int. J. Inf. Priv. Secur. Integr., 2018

2016
Developing Smart Car Parking System Using Wireless Sensor Networks.
Proceedings of the 2nd International Conference on Computing Research and Innovations, 2016

Towards a Fully Cooperative Multi-Agent Reinforcement Learning based Media Access Control Protocol for Underwater Acoustic Wireless Sensor Networks.
Proceedings of the 2nd International Conference on Computing Research and Innovations, 2016

2015
Implementing generic security requirements in e-voting using modified stegano-cryptographic approach.
Int. J. Inf. Comput. Secur., 2015

A Secure Electronic Prescription System Using Steganography with Encryption Key Implementation.
CoRR, 2015

2014
A Two-Way Loop Algorithm for Exploiting Instruction-Level Parallelism in Memory System.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014

Exploratory study of techniques for exploiting instruction-level parallelism.
Proceedings of the Global Summit on Computer & Information Technology, 2014


  Loading...