default search action
Oludare Isaac Abiodun
Person information
- affiliation: Universiti Sains Malaysia, Minden, Malaysia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, Abid Mehmood, Abiodun Esther Omolara, Ahmad K. Al Hwaitat:
Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness. Inf. 15(1): 27 (2024) - 2023
- [j19]Moatsum Alawida, Sami Mejri, Abid Mehmood, Belkacem Chikhaoui, Oludare Isaac Abiodun:
A Comprehensive Study of ChatGPT: Advancements, Limitations, and Ethical Considerations in Natural Language Processing and Cybersecurity. Inf. 14(8): 462 (2023) - [j18]Abiodun Esther Omolara, Moatsum Alawida, Oludare Isaac Abiodun:
Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey. Neural Comput. Appl. 35(31): 23063-23101 (2023) - 2022
- [j17]Olayiwola Tokunbo Taofeek, Moatsum Alawida, Abdulatif Alabdulatif, Abiodun Esther Omolara, Oludare Isaac Abiodun:
A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks During Cyber-Attacks. IEEE Access 10: 41457-41476 (2022) - [j16]Waheed Ali H. M. Ghanem, Sanaa Abduljabbar Ahmed Ghaleb, Aman Jantan, Abdullah B. Nasser, Sami Abdulla Mohsen Saleh, Amir Ngah, Arifah Che Alhadi, Humaira Arshad, Abdul-Malik H. Y. Saad, Abiodun Esther Omolara, Yousef A. Baker El-Ebiary, Oludare Isaac Abiodun:
Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks. IEEE Access 10: 76318-76339 (2022) - [j15]Sanaa Abduljabbar Ahmed Ghaleb, Mumtazimah Mohamad, Waheed Ali H. M. Ghanem, Abdullah B. Nasser, Mohamed Ghetas, Akibu Mahmoud Abdullahi, Sami Abdulla Mohsen Saleh, Humaira Arshad, Abiodun Esther Omolara, Oludare Isaac Abiodun:
Feature Selection by Multiobjective Optimization: Application to Spam Detection System by Neural Networks and Grasshopper Optimization Algorithm. IEEE Access 10: 98475-98489 (2022) - [j14]Abiodun Esther Omolara, Abdullah A. Alabdulatif, Oludare Isaac Abiodun, Moatsum Alawida, Abdulatif Alabdulatif, Wafa' Hamdan Alshoura, Humaira Arshad:
The internet of things security: A survey encompassing unexplored areas and new insights. Comput. Secur. 112: 102494 (2022) - [j13]Moatsum Alawida, Abiodun Esther Omolara, Oludare Isaac Abiodun, Murad Al-Rajab:
A deeper look into cybersecurity issues in the wake of Covid-19: A survey. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8176-8206 (2022) - [j12]Oludare Isaac Abiodun, Moatsum Alawida, Abiodun Esther Omolara, Abdulatif Alabdulatif:
Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 10217-10245 (2022) - [j11]Humaira Arshad, Saima Abdullah, Moatsum Alawida, Abdulatif Alabdulatif, Oludare Isaac Abiodun, Omer Riaz:
A Multi-Layer Semantic Approach for Digital Forensics Automation for Online Social Networks. Sensors 22(3): 1115 (2022) - 2021
- [j10]Esther Omolara Abiodun, Abdulatif Alabdulatif, Oludare Isaac Abiodun, Moatsum Alawida, Abdullah A. Alabdulatif, Rami S. Alkhawaldeh:
A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities. Neural Comput. Appl. 33(22): 15091-15118 (2021) - [j9]Esther Omolara Abiodun, Abdulatif Alabdulatif, Oludare Isaac Abiodun, Moatsum Alawida, Abdullah A. Alabdulatif, Rami S. Alkhawaldeh:
Correction to: A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities. Neural Comput. Appl. 33(22): 15119 (2021) - [j8]Oludare Isaac Abiodun, Esther Omolara Abiodun, Moatsum Alawida, Rami S. Alkhawaldeh, Humaira Arshad:
A Review on the Security of the Internet of Things: Challenges and Solutions. Wirel. Pers. Commun. 119(3): 2603-2637 (2021) - 2020
- [j7]Humaira Arshad, Aman Jantan, Gan Keng Hoon, Oludare Isaac Abiodun:
Formal knowledge model for online social network forensics. Comput. Secur. 89 (2020) - [j6]Humaira Arshad, Esther Omolara, Isaac Oludare Abiodun, Abdulhai Aminu:
A semi-automated forensic investigation model for online social networks. Comput. Secur. 97: 101946 (2020) - [j5]Abiodun Esther Omolara, Aman Jantan, Oludare Isaac Abiodun, Humaira Arshad, Kemi Victoria Dada, Etuh Emmanuel:
HoneyDetails: A prototype for ensuring patient's information privacy and thwarting electronic health record threats based on decoys. Health Informatics J. 26(3): 2083-2104 (2020) - [j4]Esther Omolara Abiodun, Aman Jantan, Oludare Isaac Abiodun, Humaira Arshad:
Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp. Wirel. Pers. Commun. 112(4): 2533-2556 (2020)
2010 – 2019
- 2019
- [j3]Abiodun Esther Omolara, Aman Jantan, Oludare Isaac Abiodun, Kemi Victoria Dada, Humaira Arshad, Etuh Emmanuel:
A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems. IEEE Access 7: 100881-100898 (2019) - [j2]Oludare Isaac Abiodun, Muhammad Ubale Kiru, Aman Jantan, Abiodun Esther Omolara, Kemi Victoria Dada, Abubakar Malah Umar, Okafor Uchenwa Linus, Humaira Arshad, Abdullahi Aminu Kazaure, Usman Gana:
Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition. IEEE Access 7: 158820-158846 (2019) - 2018
- [j1]Humaira Arshad, Aman Bin Jantan, Oludare Isaac Abiodun:
Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence. J. Inf. Process. Syst. 14(2): 346-376 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint