Search Results - "Omolara, Abiodun Esther"

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition by Abiodun, Oludare Isaac, Kiru, Muhammad Ubale, Jantan, Aman, Omolara, Abiodun Esther, Dada, Kemi Victoria, Umar, Abubakar Malah, Linus, Okafor Uchenwa, Arshad, Humaira, Kazaure, Abdullahi Aminu, Gana, Usman

    Published in IEEE access (2019)
    “…The era of artificial neural network (ANN) began with a simplified application in many fields and remarkable success in pattern recognition (PR) even in…”
    Get full text
    Journal Article
  2. 2

    Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey by Isaac Abiodun, Oludare, Alawida, Moatsum, Esther Omolara, Abiodun, Alabdulatif, Abdulatif

    “…It is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For…”
    Get full text
    Journal Article
  3. 3
  4. 4

    Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness by Alawida, Moatsum, Abu Shawar, Bayan, Abiodun, Oludare Isaac, Mehmood, Abid, Omolara, Abiodun Esther, Al Hwaitat, Ahmad K.

    Published in Information (Basel) (01-01-2024)
    “…The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a…”
    Get full text
    Journal Article
  5. 5

    A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks During Cyber-Attacks by Taofeek, Olayiwola Tokunbo, Alawida, Moatsum, Alabdulatif, Abdulatif, Omolara, Abiodun Esther, Abiodun, Oludare Isaac

    Published in IEEE access (2022)
    “…The exponential increase in the compromise of sensitive and intellectual properties alludes to the huge price the global community must pay for the digital…”
    Get full text
    Journal Article
  6. 6

    A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems by Omolara, Abiodun Esther, Jantan, Aman, Isaac Abiodun, Oludare, Victoria Dada, Kemi, Arshad, Humaira, Emmanuel, Etuh

    Published in IEEE access (2019)
    “…Communication security deals with attributes such as confidentiality, integrity, and availability. The current strategies used to achieve covertness of…”
    Get full text
    Journal Article
  7. 7
  8. 8

    State-of-the-art in artificial neural network applications: A survey by Abiodun, Oludare Isaac, Jantan, Aman, Omolara, Abiodun Esther, Dada, Kemi Victoria, Mohamed, Nachaat AbdElatif, Arshad, Humaira

    Published in Heliyon (01-11-2018)
    “…This is a survey of neural network applications in the real-world scenario. It provides a taxonomy of artificial neural networks (ANNs) and furnish the reader…”
    Get full text
    Journal Article
  9. 9
  10. 10

    Detection of Ponzi scheme on Ethereum using machine learning algorithms by Onu, Ifeyinwa Jacinta, Omolara, Abiodun Esther, Alawida, Moatsum, Abiodun, Oludare Isaac, Alabdultif, Abdulatif

    Published in Scientific reports (27-10-2023)
    “…Security threats posed by Ponzi schemes present a considerably higher risk compared to many other online crimes. These fraudulent online businesses, including…”
    Get full text
    Journal Article
  11. 11

    HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys by Esther Omolara, Abiodun, Jantan, Aman, Abiodun, Oludare Isaac, Arshad, Humaira, Dada, Kemi Victoria, Emmanuel, Etuh

    Published in Health informatics journal (01-09-2020)
    “…Advancements in electronic health record system allow patients to store and selectively share their medical records as needed with doctors. However, privacy…”
    Get full text
    Journal Article
  12. 12

    DaE2: Unmasking malicious URLs by leveraging diverse and efficient ensemble machine learning for online security by Omolara, Abiodun Esther, Alawida, Moatsum

    Published in Computers & security (01-01-2025)
    “…Over 5.44 billion people now use the Internet, making it a vital part of daily life, enabling communication, e-commerce, education, and more. However, this…”
    Get full text
    Journal Article
  13. 13

    The internet of things security: A survey encompassing unexplored areas and new insights by Omolara, Abiodun Esther, Alabdulatif, Abdullah, Abiodun, Oludare Isaac, Alawida, Moatsum, Alabdulatif, Abdulatif, Alshoura, Wafa’ Hamdan, Arshad, Humaira

    Published in Computers & security (01-01-2022)
    “…The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of life undertakings, mandates continuous research pursuits in…”
    Get full text
    Journal Article
  14. 14

    Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey by Omolara, Abiodun Esther, Alawida, Moatsum, Abiodun, Oludare Isaac

    Published in Neural computing & applications (01-11-2023)
    “…This paper presented an exhaustive survey on the security and privacy issues of drones. These security concerns were thoroughly dissected, particularly the…”
    Get full text
    Journal Article
  15. 15

    A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities by Abiodun, Esther Omolara, Alabdulatif, Abdulatif, Abiodun, Oludare Isaac, Alawida, Moatsum, Alabdulatif, Abdullah, Alkhawaldeh, Rami S.

    Published in Neural computing & applications (01-11-2021)
    “…Specialized data preparation techniques, ranging from data cleaning, outlier detection, missing value imputation, feature selection (FS), amongst others, are…”
    Get full text
    Journal Article
  16. 16

    A deeper look into cybersecurity issues in the wake of Covid-19: A survey by Alawida, Moatsum, Omolara, Abiodun Esther, Abiodun, Oludare Isaac, Al-Rajab, Murad

    “…This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime,highlighting the wide spectrum of cyberattacks that occurred around the…”
    Get full text
    Journal Article
  17. 17

    A Review on the Security of the Internet of Things: Challenges and Solutions by Abiodun, Oludare Isaac, Abiodun, Esther Omolara, Alawida, Moatsum, Alkhawaldeh, Rami S., Arshad, Humaira

    Published in Wireless personal communications (01-08-2021)
    “…The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health,…”
    Get full text
    Journal Article
  18. 18

    Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp by Abiodun, Esther Omolara, Jantan, Aman, Abiodun, Oludare Isaac, Arshad, Humaira

    Published in Wireless personal communications (01-06-2020)
    “…In this paper, an enhanced honey encryption (HE) scheme for reinforcing the security of instant messaging systems and confounding the time and resources of…”
    Get full text
    Journal Article
  19. 19
  20. 20

    A Hybridized Honey Encryption for Data Security using Residue Number System by GIWA, Tawakalitu Afoluwaso, ABIODUN, Oludare Isaac, OMOLARA, Abiodun Esther, ISIAKA, Rafiu Mope

    “…Different encryption algorithms such as Advanced Encryption Standard (AES), Rivest, Shamir, Adleman (RSA) were proposed to protect the privacy of the data…”
    Get full text
    Journal Article