Zobrazeno 1 - 10
of 53
pro vyhledávání: '"Moatsum Alawida"'
Publikováno v:
IEEE Access, Vol 12, Pp 137176-137193 (2024)
The widespread use of smartphones and their constant connection to the Internet makes them vulnerable to phishing attacks. Phishing is the act of sending malicious content such as emails to unsuspecting individuals. Smishing, a hybrid of Short Messag
Externí odkaz:
https://doaj.org/article/6470364d155145618dc74c840ebf7e27
Publikováno v:
IEEE Access, Vol 12, Pp 27530-27555 (2024)
In the contemporary landscape, where a huge amount of data plays a vital role, the importance of strong and robust cybersecurity measures has become increasingly paramount. This research proposes a review and extensively explores cybersecurity techni
Externí odkaz:
https://doaj.org/article/dce80b7ca3e84dc2be9de16f2856948c
Autor:
Ifeyinwa Jacinta Onu, Abiodun Esther Omolara, Moatsum Alawida, Oludare Isaac Abiodun, Abdulatif Alabdultif
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-19 (2023)
Abstract Security threats posed by Ponzi schemes present a considerably higher risk compared to many other online crimes. These fraudulent online businesses, including Ponzi schemes, have witnessed rapid growth and emerged as major threats in societi
Externí odkaz:
https://doaj.org/article/82d580fe416c4813887dc2f31e27e873
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 10, Pp 10217-10245 (2022)
It is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For instance, data provenance, which records the origins of data, and the record of data usage, update
Externí odkaz:
https://doaj.org/article/95f9a5ab327a47bcab1c52bf5c80ce79
Autor:
Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, Abid Mehmood, Abiodun Esther Omolara, Ahmad K. Al Hwaitat
Publikováno v:
Information, Vol 15, Iss 1, p 27 (2024)
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a variety of domains. However, this popularity has attracted the attention of malicious actors
Externí odkaz:
https://doaj.org/article/fcc33dd3790f4c7a8470fa880acfc92c
Publikováno v:
Alexandria Engineering Journal, Vol 61, Iss 7, Pp 5713-5734 (2022)
Image watermarking commonly involves singular value decomposition (SVD) because of its simplicity and minimal effect on image quality. However, SVD-based image watermarking schemes suffer from some drawbacks such as the false positive problem (FPP),
Externí odkaz:
https://doaj.org/article/e1452b18094c447eb84e4ecadc2fb054
Autor:
Moatsum Alawida
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 6, Pp 101595- (2023)
Image encryption is an essential method for ensuring confidentiality during transmission on open channels. Digital images have a high correlation with large redundant data, requiring alternative spatial handling during encryption. Digital chaos offer
Externí odkaz:
https://doaj.org/article/8884e43354984b8cbb5fc12d341f564b
Autor:
Ifeyinwa Jacinta Onu, Abiodun Esther Omolara, Moatsum Alawida, Oludare Isaac Abiodun, Abdulatif Alabdultif
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-1 (2023)
Externí odkaz:
https://doaj.org/article/0c8b3ee5516145648586a3cd438364f6
Autor:
Olayiwola Tokunbo Taofeek, Moatsum Alawida, Abdulatif Alabdulatif, Abiodun Esther Omolara, Oludare Isaac Abiodun
Publikováno v:
IEEE Access, Vol 10, Pp 41457-41476 (2022)
The exponential increase in the compromise of sensitive and intellectual properties alludes to the huge price the global community must pay for the digital revolution we are currently experiencing. This irrefutable reality is a major reason why cyber
Externí odkaz:
https://doaj.org/article/29b1ded0c7c249c8a91df71554c91ee2
Publikováno v:
Information, Vol 14, Iss 8, p 462 (2023)
This paper presents an in-depth study of ChatGPT, a state-of-the-art language model that is revolutionizing generative text. We provide a comprehensive analysis of its architecture, training data, and evaluation metrics and explore its advancements a
Externí odkaz:
https://doaj.org/article/4b2453159f7b41ada83bc9f6dce5cba6