Search Results - "Omolara, Abiodun Esther"
-
1
Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition
Published in IEEE access (2019)“…The era of artificial neural network (ANN) began with a simplified application in many fields and remarkable success in pattern recognition (PR) even in…”
Get full text
Journal Article -
2
Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
Published in Journal of King Saud University. Computer and information sciences (01-11-2022)“…It is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For…”
Get full text
Journal Article -
3
Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks
Published in IEEE access (2022)“…The staggering development of cyber threats has propelled experts, professionals and specialists in the field of security into the development of more…”
Get full text
Journal Article -
4
Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness
Published in Information (Basel) (01-01-2024)“…The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a…”
Get full text
Journal Article -
5
A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks During Cyber-Attacks
Published in IEEE access (2022)“…The exponential increase in the compromise of sensitive and intellectual properties alludes to the huge price the global community must pay for the digital…”
Get full text
Journal Article -
6
A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems
Published in IEEE access (2019)“…Communication security deals with attributes such as confidentiality, integrity, and availability. The current strategies used to achieve covertness of…”
Get full text
Journal Article -
7
Feature Selection by Multiobjective Optimization: Application to Spam Detection System by Neural Networks and Grasshopper Optimization Algorithm
Published in IEEE access (2022)“…Networks are strained by spam, which also overloads email servers and blocks mailboxes with unwanted messages and files. Setting the protective level for spam…”
Get full text
Journal Article -
8
State-of-the-art in artificial neural network applications: A survey
Published in Heliyon (01-11-2018)“…This is a survey of neural network applications in the real-world scenario. It provides a taxonomy of artificial neural networks (ANNs) and furnish the reader…”
Get full text
Journal Article -
9
Author Correction: Detection of Ponzi scheme on Ethereum using machine learning algorithms
Published in Scientific reports (28-11-2023)Get full text
Journal Article -
10
Detection of Ponzi scheme on Ethereum using machine learning algorithms
Published in Scientific reports (27-10-2023)“…Security threats posed by Ponzi schemes present a considerably higher risk compared to many other online crimes. These fraudulent online businesses, including…”
Get full text
Journal Article -
11
HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys
Published in Health informatics journal (01-09-2020)“…Advancements in electronic health record system allow patients to store and selectively share their medical records as needed with doctors. However, privacy…”
Get full text
Journal Article -
12
DaE2: Unmasking malicious URLs by leveraging diverse and efficient ensemble machine learning for online security
Published in Computers & security (01-01-2025)“…Over 5.44 billion people now use the Internet, making it a vital part of daily life, enabling communication, e-commerce, education, and more. However, this…”
Get full text
Journal Article -
13
The internet of things security: A survey encompassing unexplored areas and new insights
Published in Computers & security (01-01-2022)“…The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of life undertakings, mandates continuous research pursuits in…”
Get full text
Journal Article -
14
Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey
Published in Neural computing & applications (01-11-2023)“…This paper presented an exhaustive survey on the security and privacy issues of drones. These security concerns were thoroughly dissected, particularly the…”
Get full text
Journal Article -
15
A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities
Published in Neural computing & applications (01-11-2021)“…Specialized data preparation techniques, ranging from data cleaning, outlier detection, missing value imputation, feature selection (FS), amongst others, are…”
Get full text
Journal Article -
16
A deeper look into cybersecurity issues in the wake of Covid-19: A survey
Published in Journal of King Saud University. Computer and information sciences (01-11-2022)“…This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime,highlighting the wide spectrum of cyberattacks that occurred around the…”
Get full text
Journal Article -
17
A Review on the Security of the Internet of Things: Challenges and Solutions
Published in Wireless personal communications (01-08-2021)“…The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health,…”
Get full text
Journal Article -
18
Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp
Published in Wireless personal communications (01-06-2020)“…In this paper, an enhanced honey encryption (HE) scheme for reinforcing the security of instant messaging systems and confounding the time and resources of…”
Get full text
Journal Article -
19
-
20
A Hybridized Honey Encryption for Data Security using Residue Number System
Published in International journal of information security and cybercrime (Online) (27-12-2023)“…Different encryption algorithms such as Advanced Encryption Standard (AES), Rivest, Shamir, Adleman (RSA) were proposed to protect the privacy of the data…”
Get full text
Journal Article