Follow
Dr. Musa Muhammad
Dr. Musa Muhammad
Cyber Security Operations Centre Analyst
No verified email
Title
Cited by
Cited by
Year
3D printing of PEEK–cHAp scaffold for medical bone implant
BI Oladapo, SA Zahedi, SO Ismail, FT Omigbodun, OK Bowoto, ...
Bio-Design and Manufacturing 4, 44-59, 2021
772021
Lattice design and 3D-printing of PEEK with Ca10 (OH)(PO4) 3 and in-vitro bio-composite for bone implant
BI Oladapo, SO Ismail, OK Bowoto, FT Omigbodun, MA Olawumi, ...
International Journal of Biological Macromolecules 165, 50-62, 2020
642020
Developing an intelligent filtering technique for bring your own device network access control
MA Muhammad, A Ayesh, PB Zadeh
proceedings of the international conference on future networks and …, 2017
212017
Behavior-Based Outlier Detection for Network Access Control Systems
AAIW Musa Abubakar Muhammad
Proceedings of the 3rd International Conference on Future Networks and …, 2019
8*2019
Model hybrid magnetorheological damping prediction in machine tools
Bankole I. Oladapo, Musa A. Muhammad, Victor A. Adebiyi, Bowoto Oluwole ...
Engineering Structures, 213 (110621), 2020
62020
A Behaviour Profiling Based Technique for Network Access Control Systems
AA MUHAMMAD, Musa Abubakar
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 8 (1 …, 2019
6*2019
Digital data extraction for vehicles forensic investigation
C Stathers, M Muhammad, A Fasanmade, A Al-Bayatti, J Morden, ...
2022 International Conference on Innovation and Intelligence for Informatics …, 2022
52022
Device-type profiling for network access control systems using clustering-based multivariate Gaussian outlier score
M Muhammad, U Daniel Ani, AA Abdullahi, P Radanliev
The 5th International Conference on Future Networks & Distributed Systems …, 2021
42021
Improving Security in Bring Your Own Device (BYOD) Environment by Controlling Access
MA Muhammad, PB Zadeh, A Ayesh
Dora, 2016
32016
Enhancing Business Operations Using Blockchain Technology in A Trade Finance Domain
I Abdullahi, A Aliyu, M Muhammad
12020
Data-Driven Design for Anomaly Detection in Network Access Control Systems
MA Muhammad, F Caraffini, A Fasanmade, O Ishola, K Mohammed, ...
2023 International Conference on Business Analytics for Technology and …, 2023
2023
A Fuzzy Logic Approach to a Hybrid Lexicon-Based Sentiment Analysis Detection Tool Using Healthcare Covid-19 News Articles
JN Morden, AS Khuman, A Fasanmade, M Muhammad
Artificial Intelligence in Healthcare: Recent Applications and Developments …, 2022
2022
Device-type profiling using packet inter-arrival time for Network Access Control
M Muhammad
De Montfort University, 2021
2021
PRELUDE TO SINGULARITY
AA Abdullahi, AL Hussein, FL Gambo, US Jahun, MM Abubakar
2018
Logintegrity: A Conceptual Approach Towards Enhancing the Integrity for Log Evidence
MM Nneka C. Daniel, Uchenna P. Daniel Ani
Poster: 4th International Conference on Forensic Research & Technology …, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–15