SMS security: an asymmetric encryption approach M Agoyi, D Seral 2010 6th International Conference on Wireless and Mobile Communications, 448-452, 2010 | 100 | 2010 |
A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition M Agoyi, E Çelebi, G Anbarjafari Signal, Image and Video Processing 9, 735-745, 2015 | 78 | 2015 |
Robust non-blind color video watermarking using QR decomposition and entropy analysis P Rasti, S Samiei, M Agoyi, S Escalera, G Anbarjafari Journal of Visual Communication and Image Representation 38, 838-847, 2016 | 74 | 2016 |
A Hybrid Wormhole Attack Detection in Mobile Ad-Hoc Network (MANET) M Tahboush, M Agoyi IEEE Access 9, 11872-11883., 2021 | 62 | 2021 |
Examining factors influencing e-learning engagement among university students during covid-19 pandemic: A mediating role of “learning persistence” I Adeshola, M Agoyi Interactive Learning Environments 31 (10), 6195-6222, 2023 | 31 | 2023 |
Sustainable adoption of E-government from the UTAUT perspective M Zeebaree, M Agoyi, M Aqel Sustainability 14 (9), 5370, 2022 | 30 | 2022 |
A biometrics approach to population census and national identification in Nigeria: A prerequisite for planning and development AT Eniayejuni, M Agoyi Asian Transactions on Basic and Applied Sciences 1 (5), 60-67, 2011 | 29 | 2011 |
A Robust Color Image Watermarking Scheme Using Entropy and QR Decomposition. L Laur, P Rasti, M Agoyi, G Anbarjafari Radioengineering 24 (4), 2015 | 28 | 2015 |
Assessing faculty’s use of social network tools in Libyan higher education via a technology acceptance model I Aburagaga, M Agoyi, I Elgedawy IEEE Access 8, 116415-116430, 2020 | 27 | 2020 |
Integrating Digital Innovation Capabilities Towards Value Creation: A Conceptual View SA Edu, M Agoyi, DQ Agozie Journal Of Intelligent Information Technologies 16 (4), 37- 50, 2020 | 26 | 2020 |
Colour image blind watermarking scheme based on fast walsh hadamard transform and hessenberg decomposition O Abodena, M Agoyi Studies in Informatics and Control 27 (3), 339-348, 2018 | 21 | 2018 |
Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis AS Edu, M Agoyi, D Agozie PeerJ Computer Science 7, e658, 2021 | 19 | 2021 |
Linking FOMO and smartphone use to social media brand communities OS Osemeahon, M Agoyi Sustainability 12 (6), 2166, 2020 | 19 | 2020 |
Social TV engagement for increasing and sustaining social TV viewers O Odunaiya, M Agoyi, OS Osemeahon Sustainability 12 (12), 4906, 2020 | 16 | 2020 |
Review of security issues in e-Healthcare and solutions PE Idoga, M Agoyi, EY Coker-Farrell, OL Ekeoma 2016 HONET-ICT, 118-121, 2016 | 14 | 2016 |
Robust grayscale watermarking technique based on face detection L Laur, M Daneshmand, M Agoyi, G Anbarjafari 2015 23nd Signal Processing and Communications Applications Conference (SIU …, 2015 | 12 | 2015 |
Hybrid technique for robust image watermarking using discrete time fourier transform O Abodena, M Agoyi, E Celebi 2017 25th Signal Processing and Communications Applications Conference (SIU …, 2017 | 11 | 2017 |
The use of SMS encrypted message to secure automatic teller machine M Agoyi, D Seral Procedia Computer Science 3, 1310-1314, 2011 | 11 | 2011 |
Digitalization and the environment: The role of information and communication technology and environmental taxes in European countries I Adeshola, O Usman, M Agoyi, AA Awosusi, TS Adebayo Natural Resources Forum, 2023 | 7 | 2023 |
Multistage Security Detection in Mobile Ad-Hoc Network (MANET). M Tahboush, M Agoyi, A Esaid International Journal of Engineering Trends and Technology 68 (11), 97 -104, 2020 | 5 | 2020 |