|
RECENT PUBLICATIONS
1.Iloanusi, O. N. and Osuagwu C. C. (2012), Framework for a Dynamic Fingerprint Indexing Biometric – Based Voter Enrolment, Verification and Voting System. Africa Journal of Computing & ICTs’, Vol. 5 No. 4 Issue 2 pp. 55-56. http://www.ajocict.net
2.Iloanusi, O. N. and Osuagwu C. C. (2012), ICT Diffusion and Uptake in Nigeria Tertiary Educational Institutions: Trends, Perspectives and Possibilities African journal of Computing & ICTs’ Vol. 5 No. 4, issue 2, pp. 77-84. http://www.ajocict.net
3.G. E. Okereke and C. C. Osuagwu (2012), “A metric model for Ranking the Security Strength of a Web Page”, International Journal of Enterprise Computing and Business Systems. India, ISSN (Online): 2230-249; http://www.ijecbs.ocm.
4.G. E. Okereke and C. C. Osuagwu (2010), “Security Metrics Model for Web Page Vulnerability, Classification and Ranking”. IEEE, the African Journal of Computing 7 ICTs, Vol. 5, No. 5 pp. 8-14, www.ajocict.net.
5.G. E. Okereke and C. C. Osuagwu (2010), “Security Metrics Model for Web Application Vulnerability Analysis”. IEEE, the African Journal of Computing & ICTs, Vol. 5. No 5. Pp.8- 14, www.afocict.net.
6.Iloanusi, O. N. and Osuagwu C. C. (2011), “Clustering; Applied to Data Structuring and Retrieval” International Journal of Advanced Computer Science and Applications (IJASCA), Vol.2. Issue 11, Nov. 2011. ISSN 2156-5570, pp. 100-105. Publication of the Science and Information Organization USA. www.ijasca.thesia.org. Journal Source: http://thesai.org/downloads/volume2No11/paper%2016.
7.Osuagwu C. C. and Iloanusi, O. N. (2011). “Performance Evaluation of Feature Sets of Minutiae Quadruplets” Nigeria Journal of Technology (NIJOTECH) Vol. 30, No. 3, October 2011 pp. 21 – 28.
8.G. e. Okereke; C. C. Osuagwu (2011), “Security Metrics Models for Enterprise Information System”, International Journal of Physical of Science; Vol 3, pp. 21 – 26.
9.G. e. Okereke; C. C. Osuagwu (2011), “Public key Cryptography in Electronic Funds Transfer System”, International Journal of Research in Engineering Science, Vol. 3, No. 2, pp. 8-15.
10.C. C. Osuagwu, G. E. Okereke (2011), “A Mathematical Framework for Ranking Vulnerabilities of an Enterprise Communication System”, International Journal of Research in Engineering Sciences, Vol. 3, No. 2, p. 37-47.