1. O. Oluwaseun , “ Strategies for Managing Information Flow in Nigeria Healthcare System Strategies for Managing Information Flow in Nigeria Healthcare System,” no . October, 2015, doi: 10 .5120/ijais 2015 451443. 10.5120/ijais2015451443 O. Oluwaseun, “Strategies for Managing Information Flow in Nigeria Healthcare System Strategies for Managing Information Flow in Nigeria Healthcare System,” no. October, 2015, doi: 10.5120/ijais2015451443.
2. A Survey on Slow DDoS Attack Detection Techniques;Akanji O. S.;ITED,2020
3. Design and Analysis of Playfair Ciphers with Different Matrix Sizes
4. Efficient Digital Encryption Algorithm Based on Matrix Scrambling Technique;K. K. M, M.;Int. J. Netw. Secur. Its Appl.,2010
5. A. T. Sadiq and L. Ali , “ Attacking Transposition Cipher Using Improved Cuckoo Search ,” no. March 2014 , 2015. A. T. Sadiq and L. Ali, “Attacking Transposition Cipher Using Improved Cuckoo Search,” no. March 2014, 2015.