Search Results - "Abiodun, Oludare Isaac"

Refine Results
  1. 1

    A Comprehensive Study of ChatGPT: Advancements, Limitations, and Ethical Considerations in Natural Language Processing and Cybersecurity by Alawida, Moatsum, Mejri, Sami, Mehmood, Abid, Chikhaoui, Belkacem, Isaac Abiodun, Oludare

    Published in Information (Basel) (01-08-2023)
    “…This paper presents an in-depth study of ChatGPT, a state-of-the-art language model that is revolutionizing generative text. We provide a comprehensive…”
    Get full text
    Journal Article
  2. 2

    Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey by Isaac Abiodun, Oludare, Alawida, Moatsum, Esther Omolara, Abiodun, Alabdulatif, Abdulatif

    “…It is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For…”
    Get full text
    Journal Article
  3. 3

    A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems by Omolara, Abiodun Esther, Jantan, Aman, Isaac Abiodun, Oludare, Victoria Dada, Kemi, Arshad, Humaira, Emmanuel, Etuh

    Published in IEEE access (2019)
    “…Communication security deals with attributes such as confidentiality, integrity, and availability. The current strategies used to achieve covertness of…”
    Get full text
    Journal Article
  4. 4

    State-of-the-art in artificial neural network applications: A survey by Abiodun, Oludare Isaac, Jantan, Aman, Omolara, Abiodun Esther, Dada, Kemi Victoria, Mohamed, Nachaat AbdElatif, Arshad, Humaira

    Published in Heliyon (01-11-2018)
    “…This is a survey of neural network applications in the real-world scenario. It provides a taxonomy of artificial neural networks (ANNs) and furnish the reader…”
    Get full text
    Journal Article
  5. 5

    A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities by Abiodun, Esther Omolara, Alabdulatif, Abdulatif, Abiodun, Oludare Isaac, Alawida, Moatsum, Alabdulatif, Abdullah, Alkhawaldeh, Rami S.

    Published in Neural computing & applications (01-11-2021)
    “…Specialized data preparation techniques, ranging from data cleaning, outlier detection, missing value imputation, feature selection (FS), amongst others, are…”
    Get full text
    Journal Article
  6. 6

    Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition by Abiodun, Oludare Isaac, Kiru, Muhammad Ubale, Jantan, Aman, Omolara, Abiodun Esther, Dada, Kemi Victoria, Umar, Abubakar Malah, Linus, Okafor Uchenwa, Arshad, Humaira, Kazaure, Abdullahi Aminu, Gana, Usman

    Published in IEEE access (2019)
    “…The era of artificial neural network (ANN) began with a simplified application in many fields and remarkable success in pattern recognition (PR) even in…”
    Get full text
    Journal Article
  7. 7

    A semi-automated forensic investigation model for online social networks by Arshad, Humaira, Omlara, Esther, Abiodun, Isaac Oludare, Aminu, Abdulhai

    Published in Computers & security (01-10-2020)
    “…Investigating the online social network profiles of victims, suspects, and witnesses are now part of almost every legal investigation, either it involves a…”
    Get full text
    Journal Article
  8. 8

    A Review on the Security of the Internet of Things: Challenges and Solutions by Abiodun, Oludare Isaac, Abiodun, Esther Omolara, Alawida, Moatsum, Alkhawaldeh, Rami S., Arshad, Humaira

    Published in Wireless personal communications (01-08-2021)
    “…The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health,…”
    Get full text
    Journal Article
  9. 9
  10. 10

    A Multi-Layer Semantic Approach for Digital Forensics Automation for Online Social Networks by Arshad, Humaira, Abdullah, Saima, Alawida, Moatsum, Alabdulatif, Abdulatif, Abiodun, Oludare Isaac, Riaz, Omer

    Published in Sensors (Basel, Switzerland) (01-02-2022)
    “…Currently, law enforcement and legal consultants are heavily utilizing social media platforms to easily access data associated with the preparators of…”
    Get full text
    Journal Article
  11. 11

    Detection of Ponzi scheme on Ethereum using machine learning algorithms by Onu, Ifeyinwa Jacinta, Omolara, Abiodun Esther, Alawida, Moatsum, Abiodun, Oludare Isaac, Alabdultif, Abdulatif

    Published in Scientific reports (27-10-2023)
    “…Security threats posed by Ponzi schemes present a considerably higher risk compared to many other online crimes. These fraudulent online businesses, including…”
    Get full text
    Journal Article
  12. 12
  13. 13

    Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp by Abiodun, Esther Omolara, Jantan, Aman, Abiodun, Oludare Isaac, Arshad, Humaira

    Published in Wireless personal communications (01-06-2020)
    “…In this paper, an enhanced honey encryption (HE) scheme for reinforcing the security of instant messaging systems and confounding the time and resources of…”
    Get full text
    Journal Article
  14. 14
  15. 15

    Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness by Alawida, Moatsum, Abu Shawar, Bayan, Abiodun, Oludare Isaac, Mehmood, Abid, Omolara, Abiodun Esther, Al Hwaitat, Ahmad K.

    Published in Information (Basel) (01-01-2024)
    “…The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a…”
    Get full text
    Journal Article
  16. 16

    HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys by Esther Omolara, Abiodun, Jantan, Aman, Abiodun, Oludare Isaac, Arshad, Humaira, Dada, Kemi Victoria, Emmanuel, Etuh

    Published in Health informatics journal (01-09-2020)
    “…Advancements in electronic health record system allow patients to store and selectively share their medical records as needed with doctors. However, privacy…”
    Get full text
    Journal Article
  17. 17

    A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks During Cyber-Attacks by Taofeek, Olayiwola Tokunbo, Alawida, Moatsum, Alabdulatif, Abdulatif, Omolara, Abiodun Esther, Abiodun, Oludare Isaac

    Published in IEEE access (2022)
    “…The exponential increase in the compromise of sensitive and intellectual properties alludes to the huge price the global community must pay for the digital…”
    Get full text
    Journal Article
  18. 18
  19. 19

    The internet of things security: A survey encompassing unexplored areas and new insights by Omolara, Abiodun Esther, Alabdulatif, Abdullah, Abiodun, Oludare Isaac, Alawida, Moatsum, Alabdulatif, Abdulatif, Alshoura, Wafa’ Hamdan, Arshad, Humaira

    Published in Computers & security (01-01-2022)
    “…The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of life undertakings, mandates continuous research pursuits in…”
    Get full text
    Journal Article
  20. 20

    Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey by Omolara, Abiodun Esther, Alawida, Moatsum, Abiodun, Oludare Isaac

    Published in Neural computing & applications (01-11-2023)
    “…This paper presented an exhaustive survey on the security and privacy issues of drones. These security concerns were thoroughly dissected, particularly the…”
    Get full text
    Journal Article