default search action
Shafii Muhammad Abdulhamid
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j24]Daksh Dave, Aditya Sharma, Shafii Muhammad Abdulhamid, Adeel Ahmed, Adnan Akhunzada, Rashid Amin:
SAppKG: Mobile App Recommendation Using Knowledge Graph and Side Information-A Secure Framework. IEEE Access 11: 76751-76767 (2023) - [j23]Imran Javed, Uzair Iqbal Janjua, Shafii Muhammad Abdulhamid, Tahir Mustafa Madni, Adnan Akhunzada:
The Impact of Mitigation Strategies for Socio-Cultural Distance Issues in GSD: An Empirical Study. IEEE Access 11: 99499-99518 (2023) - [j22]Mohammed Abdullahi, Md. Asri Ngadi, Salihu Idi Dishing, Shafii Muhammad Abdulhamid:
An adaptive symbiotic organisms search for constrained task scheduling in cloud computing. J. Ambient Intell. Humaniz. Comput. 14(7): 8839-8850 (2023) - [c9]Dabeeruddin Syed, Abdullah Hussein Al-Ghushami, Ameema Zainab, Shafii Muhammad Abdulhamid, Mohammed Salem Daen A Al-Kuwari:
Information Security using GNU Privacy Guard. CCWC 2023: 295-300 - [i14]Daksh Dave, Aditya Sharma, Shafii Muhammad Abdulhamid, Adeel Ahmed, Adnan Akhunzada, Rashid Amin:
SAppKG: Mobile App Recommendation Using Knowledge Graph and Side Information-A Secure Framework. CoRR abs/2309.17115 (2023) - 2022
- [j21]Noel Moses Dogonyaro, Victor Onomza Waziri, Shafii Muhammad Abdulhamid, Joseph Adebayo Ojeniyi:
Review and analysis of classical algorithms and hash-based post-quantum algorithm. J. Reliab. Intell. Environ. 8(4): 397-414 (2022) - 2021
- [j20]Nureni Ayofe Azeez, Sanjay Misra, Ihotu Agbo Margaret, Luis Fernández Sanz, Shafii Muhammad Abdulhamid:
Adopting automated whitelist approach for detecting phishing attacks. Comput. Secur. 108: 102328 (2021) - [j19]Ibrahim Bello, Haruna Chiroma, Usman Ali Abdullahi, Abdulsalam Ya'u Gital, Fatsuma Jauro, Abdullah Khan, Julius Olatunji Okesola, Shafii Muhammad Abdulhamid:
Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives. J. Ambient Intell. Humaniz. Comput. 12(9): 8699-8717 (2021) - 2020
- [j18]Fatsuma Jauro, Haruna Chiroma, Abdulsalam Ya'u Gital, Mubarak Almutairi, Shafii Muhammad Abdulhamid, Jemal H. Abawajy:
Deep learning architectures in emerging cloud computing architectures: Recent development, challenges and next research trend. Appl. Soft Comput. 96: 106582 (2020) - [j17]Mohammed Abdullahi, Md. Asri Ngadi, Salihu Idi Dishing, Shafii Muhammad Abdulhamid, Mohammed Joda Usman:
A survey of symbiotic organisms search algorithms and applications. Neural Comput. Appl. 32(2): 547-566 (2020) - [j16]Auwal Ahmed Bello, Haruna Chiroma, Abdulsalam Ya'u Gital, Lubna Abdel Kareim Gabralla, Shafii Muhammad Abdulhamid, Liyana Shuib:
Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives. Neural Comput. Appl. 32(17): 13651-13678 (2020) - [j15]Nadim Rana, Muhammad Shafie Abdul Latif, Shafii Muhammad Abdulhamid, Haruna Chiroma:
Whale optimization algorithm: a systematic review of contemporary applications, modifications and developments. Neural Comput. Appl. 32(20): 16245-16277 (2020) - [c8]Olutosin Taiwo, Absalom E. Ezugwu, Nadim Rana, Shafii Muhammad Abdulhamid:
Smart Home Automation System Using ZigBee, Bluetooth and Arduino Technologies. ICCSA (6) 2020: 587-597 - [c7]Menzi Skhosana, Absalom E. Ezugwu, Nadim Rana, Shafii Muhammad Abdulhamid:
An Intelligent Machine Learning-Based Real-Time Public Transport System. ICCSA (6) 2020: 649-665 - [c6]John Oche Onah, Shafii Muhammad Abdulhamid, Sanjay Misra, Mayank Mohan Sharma, Nadim Rana, Jonathan Oluranti:
Genetic Search Wrapper-Based Naïve Bayes Anomaly Detection Model for Fog Computing Environment. ISDA 2020: 1371-1382 - [c5]Haruna Atabo Christopher, Shafii Muhammad Abdulhamid, Sanjay Misra, Isaac Odun-Ayo, Mayank Mohan Sharma:
Antlion Optimization-Based Feature Selection Scheme for Cloud Intrusion Detection Using Naïve Bayes Algorithm. ISDA 2020: 1383-1393
2010 – 2019
- 2019
- [j14]Haruna Chiroma, Usman Ali Abdullahi, Shafii Muhammad Abdulhamid, Ala Abdulsalam Alarood, Lubna Abdel Kareim Gabralla, Nadim Rana, Liyana Shuib, Ibrahim Abaker Targio Hashem, Dada Emmanuel Gbenga, Adamu I. Abubakar, Akram M. Zeki, Tutut Herawan:
Progress on Artificial Neural Networks for Big Data Analytics: A Survey. IEEE Access 7: 70535-70551 (2019) - [j13]Syed Hamid Hussain Madni, Muhammad Shafie Abdul Latif, Shafii Muhammad Abdulhamid, Javed Ali:
Hybrid gradient descent cuckoo search (HGDCS) algorithm for resource scheduling in IaaS cloud computing environment. Clust. Comput. 22(1): 301-334 (2019) - [j12]Tahir Musa Ibrahim, Shafii Muhammad Abdulhamid, Ala Abdulsalam Alarood, Haruna Chiroma, Mohammed Ali Al-garadi, Nadim Rana, Amina Nuhu Muhammad, Adamu I. Abubakar, Khalid Haruna, Lubna Abdel Kareim Gabralla:
Recent advances in mobile touch screen security authentication methods: A systematic literature review. Comput. Secur. 85: 1-24 (2019) - [j11]Mohammed Abdullahi, Md. Asri Ngadi, Salihu Idi Dishing, Shafii Muhammad Abdulhamid, Barroon Isma'eel Ahmad:
An efficient symbiotic organisms search algorithm with chaotic optimization strategy for multi-objective task scheduling problems in cloud computing environment. J. Netw. Comput. Appl. 133: 60-74 (2019) - [j10]Mohammed Abdullahi, Shafii Muhammad Abdulhamid, Morufu Olalere, John K. Alhassan, Haruna Chiroma, Dada Emmanuel Gbenga:
Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms. J. Reliab. Intell. Environ. 5(2): 67-89 (2019) - [j9]Jimoh Yakubu, Shafii Muhammad Abdulhamid, Haruna Atabo Christopher, Haruna Chiroma, Mohammed Abdullahi:
Security challenges in fog-computing environment: a systematic appraisal of current developments. J. Reliab. Intell. Environ. 5(4): 209-233 (2019) - [c4]Haruna Chiroma, Abdulsalam Ya'u Gital, Nadim Rana, Shafii Muhammad Abdulhamid, Amina Nuhu Muhammad, Aishatu Yahaya Umar, Adamu I. Abubakar:
Nature Inspired Meta-heuristic Algorithms for Deep Learning: Recent Progress and Novel Perspective. CVC (1) 2019: 59-70 - 2018
- [j8]Shafii Muhammad Abdulhamid, Muhammad Shafie Abdul Latif, Syed Hamid Hussain Madni, Mohammed Abdullahi:
Fault tolerance aware scheduling technique for cloud computing environment using dynamic clustering algorithm. Neural Comput. Appl. 29(1): 279-293 (2018) - [c3]Adamu Abdulkadir, Shafii Muhammad Abdulhamid, Oluwafemi Osho, Ismaila Idris, John K. Alhassan:
Secure Electronic Medical Records Transmission using NTRU Cryptosystem and LSB in Audio Steganography. IREHI 2018 - [c2]Dada Emmanuel Gbenga, D. Jude Hemanth, Haruna Chiroma, Shafii Muhammad Abdulhamid, Adewale Johnson Taiwo:
Non-Nested Generalisation (NNGE) Algorithm for Efficient and Early Detection of Diabetes. ITITS 2018: 233-241 - 2017
- [j7]Shafii Muhammad Abdulhamid, Muhammad Shafie Abdul Latif, Haruna Chiroma, Oluwafemi Osho, Gaddafi Abdul-Salaam, Adamu I. Abubakar, Tutut Herawan:
A Review on Mobile SMS Spam Filtering Techniques. IEEE Access 5: 15650-15666 (2017) - [j6]Shafii Muhammad Abdulhamid, Muhammad Shafie Abdul Latif:
A checkpointed league championship algorithm-based cloud scheduling scheme with secure fault tolerance responsiveness. Appl. Soft Comput. 61: 670-680 (2017) - [j5]Syed Hamid Hussain Madni, Muhammad Shafie Abdul Latif, Yahaya Coulibaly, Shafii Muhammad Abdulhamid:
Recent advancements in resource allocation techniques for cloud computing environment: a systematic review. Clust. Comput. 20(3): 2489-2533 (2017) - [j4]Andrew E. Fluck, Olawale Surajudeen Adebayo, Shafii Muhammad Abdulhamid:
Secure E-Examination Systems Compared: Case Studies from Two Countries. J. Inf. Technol. Educ. Innov. Pract. 16: 107-125 (2017) - 2016
- [j3]Mohammed Abdullahi, Md. Asri Ngadi, Shafii Muhammad Abdulhamid:
Symbiotic Organism Search optimization based task scheduling in cloud computing environment. Future Gener. Comput. Syst. 56: 640-650 (2016) - [j2]Adamu I. Abubakar, Teddy Mantoro, Sardjoeni Moedjiono, Media Anugerah Ayu, Haruna Chiroma, Ahmad Waqas, Shafii Muhammad Abdulhamid, Mukhtar Fatihu Hamza, Abdulsalam Ya'u Gital:
A Support Vector Machine Classification of Computational Capabilities of 3D Map on Mobile Device for Navigation Aid. Int. J. Interact. Mob. Technol. 10(3): 4-10 (2016) - [j1]Syed Hamid Hussain Madni, Muhammad Shafie Abdul Latif, Yahaya Coulibaly, Shafii Muhammad Abdulhamid:
Resource scheduling for infrastructure as a service (IaaS) in cloud computing: Challenges and opportunities. J. Netw. Comput. Appl. 68: 173-200 (2016) - [i13]Shafii Muhammad Abdulhamid, Muhammad Shafie Abdul Latif, Syed Hamid Hussain Madni, Oluwafemi Osho:
A Survey of League Championship Algorithm: Prospects and Challenges. CoRR abs/1603.09728 (2016) - 2015
- [c1]Shafii Muhammad Abdulhamid, Muhammad Shafie Abdul Latif, Mohammed Abdullahi:
Job Scheduling Technique for Infrastructure as a Service Cloud Using an Improved League Championship Algorithm. DaEng 2015: 479-488 - [i12]Shafii Muhammad Abdulhamid, Muhammad Shafie Abdul Latif, Ismaila Idris:
Tasks Scheduling Technique Using League Championship Algorithm for Makespan Minimization in IaaS Cloud. CoRR abs/1510.03173 (2015) - 2014
- [i11]Shafii Muhammad Abdulhamid, Fasilat Folagbayo Ibrahim:
Controlling Citizens Cyber Viewing Using Enhanced Internet Content Filters. CoRR abs/1402.0630 (2014) - [i10]Shafii Muhammad Abdulhamid, Muhammad Shafie Abdul Latif, Mohammed Bakri Bashir:
On-Demand Grid Provisioning Using Cloud Infrastructures and Related Virtualization Tools: A Survey and Taxonomy. CoRR abs/1402.0696 (2014) - [i9]Olawale Surajudeen Adebayo, Shafii Muhammad Abdulhamid:
E- Exams System for Nigerian Universities with Emphasis on Security and Result Integrity. CoRR abs/1402.0921 (2014) - [i8]Shafii Muhammad Abdulhamid, Ismaila Idris:
Design Evaluation of Some Nigerian University Portals: A Programmer's Point of View. CoRR abs/1402.1241 (2014) - [i7]Ismaila Idris, Shafii Muhammad Abdulhamid:
An Improved AIS Based E-mail Classification Technique for Spam Detection. CoRR abs/1402.1242 (2014) - [i6]Shafii Muhammad Abdulhamid, Gana Usman:
Destination Information Management System for Tourist. CoRR abs/1402.1243 (2014) - [i5]Shafii Muhammad Abdulhamid, Sulaiman Ahmad, Victor Onomza Waziri, Fatima N. Jibril:
Privacy and National Security Issues in Social Networks: The Challenges. CoRR abs/1402.3301 (2014) - [i4]Shafii Muhammad Abdulhamid, Hassan Abdulazeez, Ochoche Abraham, Umar Mohammed:
Analysing Membership Profile Privacy Issues in Online Social Networks. CoRR abs/1402.5114 (2014) - [i3]Olawale Surajudeen Adebayo, Shafii Muhammad Abdulhamid, Andrew E. Fluck:
The Prospects for e-Examinations in Nigeria and Australia. CoRR abs/1404.1669 (2014) - [i2]Mohammed Bakri Bashir, Muhammad Shafie Abdul Latif, Shafii Muhammad Abdulhamid, Cheah Tek Loon:
Grid-based Search Technique for Massive Academic Publications. CoRR abs/1405.6215 (2014) - [i1]Shafii Muhammad Abdulhamid, Muhammad Shafie Abdul Latif:
League Championship Algorithm Based Job Scheduling Scheme for Infrastructure as a Service Cloud. CoRR abs/1410.2208 (2014)
Coauthor Index
aka: Muhammad Shafie Abdul Latif
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint