Detecting ransomware attacks using intelligent algorithms: Recent development and next direction from deep learning and big data perspectives I Bello, H Chiroma, UA Abdullahi, AY Gital, F Jauro, A Khan, JO Okesola, ... Journal of Ambient Intelligence and Humanized Computing 12, 8699-8717, 2021 | 50 | 2021 |
A review on deep learning with focus on deep recurrent neural network for electricity forecasting in residential building ML Abdulrahman, KM Ibrahim, AY Gital, FU Zambuk, B Ja’afaru, ... Procedia Computer Science 193, 141-154, 2021 | 29 | 2021 |
Microorganisms associated with the production of volatile compounds in spoilt tomatoes. AD Ibrahim, K Musa, A Sani, AA Aliero, BS Yusuf | 20 | 2011 |
Mobile learning stimulus in Nigeria MB Yakubu, A Hassan, A Ahmad, KI Musa, A Gital Global Journal of Information Technology: Emerging Technologies 8 (3), 95-101, 2018 | 12 | 2018 |
Self-service infrastructure container for data intensive application IK Musa, SD Walker, AM Owen, AP Harrison Journal of Cloud Computing 3, 1-21, 2014 | 9 | 2014 |
Optimising the delivery of Scalable H. 264 Video stream by QoS/QoE correlation M Alreshoodi, J Woods, IK Musa 2015 IEEE International Conference on Consumer Electronics (ICCE), 253-254, 2015 | 5 | 2015 |
QoE-enabled transport optimisation scheme for real-time SVC video delivery M Alreshoodi, J Woods, IK Musa 2014 9th International Symposium on Communication Systems, Networks …, 2014 | 5 | 2014 |
Enhancing detection performance of face recognition algorithm using PCA-faster R-CNN HI Muhammad, KI Musa, ML Abdulrahman, A Abubakar, K Umar, A Ishola European Journal of Electrical Engineering and Computer Science 5 (3), 9-16, 2021 | 4 | 2021 |
Performance analysis of hybrid network for cloud datacenter IK Musa, R Nejabati, D Simeonidou 2012 4th Computer Science and Electronic Engineering Conference (CEEC), 154-159, 2012 | 4 | 2012 |
Optimizing Connection Weights in a Long Short-Term Memory (LSTM) Using Whale Optimization Algorithm (WOA): A Review A Ahmad, KI Musa, FU Zambuk, MA Lawal ATBU Journal of Science, Technology and Education 10 (3), 362-373, 2022 | 3 | 2022 |
Design of Intelligent and Secure Hospital Appointment Scheduling System AM Noma, KI Musa, H Mamman, AD Mato, AA Yusuf, MA Sambo 2022 IEEE Nigeria 4th International Conference on Disruptive Technologies …, 2022 | 3 | 2022 |
A proposed secured health monitoring system for the elderly using blockchain technology in Nigeria MYU Ibrahim, KI Musa, YA Yarima, A Ahmad Journal of Electronics, Computer Networking and Applied Mathematics 2 (04 …, 2022 | 3 | 2022 |
University–industry linkages, enabling policies and innovative behaviours of universities in Nigeria AY Dutse, MM Bayero, KI Musa, M Jibrin International Journal of technology management & sustainable development 20 …, 2021 | 3 | 2021 |
Predicting electricity consumption in residential building’s using deep transfer learning with attention-lstm ML Abdulrahman, AY Gital, KM Ibrahim, FU Zambuk, IM Umar, ZI Yakubu 2022 International Mobile and Embedded Technology Conference (MECON), 540-546, 2022 | 2 | 2022 |
Hybrid model for human activity recognition using an inflated i3-D two stream convolutional-LSTM network with optical flow mechanism IM Umar, KM Ibrahim, AY Gital, FU Zambuk, MA Lawal, ZI Yakubu 2022 IEEE Delhi Section Conference (DELCON), 1-7, 2022 | 2 | 2022 |
Transfer learning strategy for satellite image classification using deep convolutional neural network AS Abba, KI Musa, A Umar, N Saleh, HM Khamis, MK Dauda International Journal of Engineering Technologies and Mangament 5 (4), 1-14, 2020 | 2 | 2020 |
Multi objective optimization strategy suitable for virtual cells as a service IK Musa, W Stuart Innovations in Bio-inspired Computing and Applications: Proceedings of the …, 2014 | 2 | 2014 |
Adaptive market place for converged cloud computing model IK Musa, SD Walker 8th International Conference for Internet Technology and Secured …, 2013 | 2 | 2013 |
A Converged Service Plane for Virtual Infrastructure Containers IK Musa, S Walker International Journal of Computer Science Issues (IJCSI) 10 (2), 375, 2013 | 2 | 2013 |
A Multi Domain Base Cyber Intrusion Detection Using Deep Autoencoder Model MA Musa, AY Gital, KI Musa, H Chiroma, E Nannin International Journal of Advances in Engineering and Management 5 (2), 530-535, 2023 | 1 | 2023 |