Author of the publication

Network System Design for Combating Cybercrime in Nigeria.

, , , , , and . ICCSA (5), volume 9790 of Lecture Notes in Computer Science, page 497-512. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A clustering algorithm applied to the binarization of Swarm intelligence continuous metaheuristics., , , and . Swarm Evol. Comput., (2019)An Integral Cybersecurity Approach Using a Many-Objective Optimization Strategy., , , and . IEEE Access, (2023)Cultural Algorithms for the Set Covering Problem., , and . ICSI (2), volume 7929 of Lecture Notes in Computer Science, page 27-34. Springer, (2013)A self-adaptive biogeography-based algorithm to solve the set covering problem., , , , , , , , and . RAIRO Oper. Res., 53 (3): 1033-1059 (2019)Fine-grained parallelization of fitness functions in bioinformatics optimization problems: gene selection for cancer classification and biclustering of gene expression data., , , , , , and . BMC Bioinform., (2016)Integrating Creativity into Extreme Programming Process., and . ICEIS (3-1), page 216-219. (2008)Knowledge Management in the Development of Optimization Algorithms., , and . HCI (8), volume 4557 of Lecture Notes in Computer Science, page 604-612. Springer, (2007)A Choice Function to Dynamic Selection of Enumeration Strategies Solving Constraint Satisfaction Problems., , , and . SoCPaR, page 229-233. IEEE Computer Society, (2009)Solving the Manufacturing Cell Design Problem Using the Cuckoo Search., , , , , , and . MICAI (Special Session), page 123-129. IEEE Computer Society, (2016)Integration of Constraint Programming and Metaheuristics., , and . SARA, volume 4612 of Lecture Notes in Computer Science, page 397-398. Springer, (2007)