Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Oludare Isaac Abiodun"'
Autor:
Ifeyinwa Jacinta Onu, Abiodun Esther Omolara, Moatsum Alawida, Oludare Isaac Abiodun, Abdulatif Alabdultif
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-19 (2023)
Abstract Security threats posed by Ponzi schemes present a considerably higher risk compared to many other online crimes. These fraudulent online businesses, including Ponzi schemes, have witnessed rapid growth and emerged as major threats in societi
Externí odkaz:
https://doaj.org/article/82d580fe416c4813887dc2f31e27e873
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 10, Pp 10217-10245 (2022)
It is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For instance, data provenance, which records the origins of data, and the record of data usage, update
Externí odkaz:
https://doaj.org/article/95f9a5ab327a47bcab1c52bf5c80ce79
Autor:
Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, Abid Mehmood, Abiodun Esther Omolara, Ahmad K. Al Hwaitat
Publikováno v:
Information, Vol 15, Iss 1, p 27 (2024)
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a variety of domains. However, this popularity has attracted the attention of malicious actors
Externí odkaz:
https://doaj.org/article/fcc33dd3790f4c7a8470fa880acfc92c
Autor:
Ifeyinwa Jacinta Onu, Abiodun Esther Omolara, Moatsum Alawida, Oludare Isaac Abiodun, Abdulatif Alabdultif
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-1 (2023)
Externí odkaz:
https://doaj.org/article/0c8b3ee5516145648586a3cd438364f6
Autor:
Waheed Ali H. M. Ghanem, Sanaa Abduljabbar Ahmed Ghaleb, Aman Jantan, Abdullah B. Nasser, Sami Abdulla Mohsen Saleh, Amir Ngah, Arifah Che Alhadi, Humaira Arshad, Abdul-Malik H. Y. Saad, Abiodun Esther Omolara, Yousef A. Baker El-Ebiary, Oludare Isaac Abiodun
Publikováno v:
IEEE Access, Vol 10, Pp 76318-76339 (2022)
The staggering development of cyber threats has propelled experts, professionals and specialists in the field of security into the development of more dependable protection systems, including effective intrusion detection system (IDS) mechanisms whic
Externí odkaz:
https://doaj.org/article/8b0c18c2e28c4e3da478775a8e1bed6b
Autor:
Olayiwola Tokunbo Taofeek, Moatsum Alawida, Abdulatif Alabdulatif, Abiodun Esther Omolara, Oludare Isaac Abiodun
Publikováno v:
IEEE Access, Vol 10, Pp 41457-41476 (2022)
The exponential increase in the compromise of sensitive and intellectual properties alludes to the huge price the global community must pay for the digital revolution we are currently experiencing. This irrefutable reality is a major reason why cyber
Externí odkaz:
https://doaj.org/article/29b1ded0c7c249c8a91df71554c91ee2
Autor:
Sanaa A. A. Ghaleb, Mumtazimah Mohamad, Waheed Ali H. M. Ghanem, Abdullah B. Nasser, Mohamed Ghetas, Akibu Mahmoud Abdullahi, Sami Abdulla Mohsen Saleh, Humaira Arshad, Abiodun Esther Omolara, Oludare Isaac Abiodun
Publikováno v:
IEEE Access, Vol 10, Pp 98475-98489 (2022)
Networks are strained by spam, which also overloads email servers and blocks mailboxes with unwanted messages and files. Setting the protective level for spam filtering might become even more crucial for email users when malicious steps are taken sin
Externí odkaz:
https://doaj.org/article/4aa06dfce01048f58624d3d3ea335255
Publikováno v:
Information, Vol 14, Iss 8, p 462 (2023)
This paper presents an in-depth study of ChatGPT, a state-of-the-art language model that is revolutionizing generative text. We provide a comprehensive analysis of its architecture, training data, and evaluation metrics and explore its advancements a
Externí odkaz:
https://doaj.org/article/4b2453159f7b41ada83bc9f6dce5cba6
Autor:
Abiodun Esther Omolara, Aman Jantan, Oludare Isaac Abiodun, Kemi Victoria Dada, Humaira Arshad, Etuh Emmanuel
Publikováno v:
IEEE Access, Vol 7, Pp 100881-100898 (2019)
Communication security deals with attributes such as confidentiality, integrity, and availability. The current strategies used to achieve covertness of communication employs encryption. Encryption techniques minimize eavesdropping on the conversation
Externí odkaz:
https://doaj.org/article/61b65d73f6264523b56f9daef1f3e0c0
Autor:
Oludare Isaac Abiodun, Aman Jantan, Abiodun Esther Omolara, Kemi Victoria Dada, Abubakar Malah Umar, Okafor Uchenwa Linus, Humaira Arshad, Abdullahi Aminu Kazaure, Usman Gana, Muhammad Ubale Kiru
Publikováno v:
IEEE Access, Vol 7, Pp 158820-158846 (2019)
The era of artificial neural network (ANN) began with a simplified application in many fields and remarkable success in pattern recognition (PR) even in manufacturing industries. Although significant progress achieved and surveyed in addressing ANN a
Externí odkaz:
https://doaj.org/article/0612e932a6844953aa6a1d059b57cd88