State-of-the-art in artificial neural network applications: A survey OI Abiodun, A Jantan, AE Omolara, KV Dada, NAE Mohamed, H Arshad Heliyon 4 (11), 2018 | 3301 | 2018 |
Comprehensive review of artificial neural network applications to pattern recognition OI Abiodun, A Jantan, AE Omolara, KV Dada, AM Umar, OU Linus, ... IEEE access 7, 158820-158846, 2019 | 625 | 2019 |
The internet of things security: A survey encompassing unexplored areas and new insights AE Omolara, A Alabdulatif, OI Abiodun, M Alawida, A Alabdulatif, ... Computers & Security 112, 102494, 2022 | 217 | 2022 |
A deeper look into cybersecurity issues in the wake of Covid-19: A survey M Alawida, AE Omolara, OI Abiodun, M Al-Rajab Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022 | 164 | 2022 |
A review on the security of the internet of things: Challenges and solutions OI Abiodun, EO Abiodun, M Alawida, RS Alkhawaldeh, H Arshad Wireless Personal Communications 119, 2603-2637, 2021 | 116 | 2021 |
A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities EO Abiodun, A Alabdulatif, OI Abiodun, M Alawida, A Alabdulatif, ... Neural Computing and Applications 33 (22), 15091-15118, 2021 | 109 | 2021 |
Evidence collection and forensics on social networks: Research challenges and directions H Arshad, J Aman, O Esther Digital Investigation 28, 126-138, 2019 | 71 | 2019 |
Cyber intrusion detection system based on a multiobjective binary bat algorithm for feature selection and enhanced bat algorithm for parameter optimization in neural networks WAHM Ghanem, SAA Ghaleb, A Jantan, AB Nasser, SAM Saleh, A Ngah, ... IEEE Access 10, 76318-76339, 2022 | 60 | 2022 |
Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey OI Abiodun, M Alawida, AE Omolara, A Alabdulatif Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022 | 55 | 2022 |
Developing a modified hybrid caesar cipher and vigenere cipher for secure data communication OE Omolara, AI Oludare, SE Abdulahi Computer Engineering and Intelligent Systems 5 (5), 34-46, 2014 | 53 | 2014 |
Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey AE Omolara, M Alawida, OI Abiodun Neural computing and applications 35 (31), 23063-23101, 2023 | 34 | 2023 |
An enhanced practical difficulty of one-time pad algorithm resolving the key management and distribution problem AE Omolara, A Jantan, OI Abiodun, H Arshad proceedings of the International MultiConference of Engineers and Computer …, 2018 | 30 | 2018 |
HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys A Esther Omolara, A Jantan, OI Abiodun, H Arshad, KV Dada, ... Health informatics journal 26 (3), 2083-2104, 2020 | 29 | 2020 |
A deception model robust to eavesdropping over communication for social network systems AE Omolara, A Jantan, OI Abiodun, KV Dada, H Arshad, E Emmanuel IEEE Access 7, 100881-100898, 2019 | 29 | 2019 |
Unveiling the dark side of chatgpt: Exploring cyberattacks and enhancing user awareness M Alawida, B Abu Shawar, OI Abiodun, A Mehmood, AE Omolara, ... Information 15 (1), 27, 2024 | 28 | 2024 |
A semi-automated forensic investigation model for online social networks H Arshad, E Omlara, IO Abiodun, A Aminu Computers & Security 97, 101946, 2020 | 23 | 2020 |
Modified honey encryption scheme for encoding natural language message AE Omolara, A Jantan International Journal of Electrical and Computer Engineering (IJECE) 9 (3 …, 2019 | 23 | 2019 |
A novel approach for the adaptation of honey encryption to support natural language message AE Omolara, A Jantan, OI Abiodun, HE Poston Proceedings of the International multiconference of engineers and computer …, 2018 | 23 | 2018 |
A comprehensive review of honey encryption scheme AE Omolara, A Jantan, OI Abiodun Indonesian Journal of Electrical Engineering and Computer Science 13 (2 …, 2019 | 21 | 2019 |
Fingereye: improvising security and optimizing ATM transaction time based on iris-scan authentication. AE Omolara, A Jantan, OI Abiodun, H Arshad, NAE Mohamed International Journal of Electrical & Computer Engineering (2088-8708) 9 (3), 2019 | 20 | 2019 |