[HTML][HTML] A deeper look into cybersecurity issues in the wake of Covid-19: A survey

M Alawida, AE Omolara, OI Abiodun… - Journal of King Saud …, 2022 - Elsevier
This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime,
highlighting the wide spectrum of cyberattacks that occurred around the world. The modus …

The internet of things security: A survey encompassing unexplored areas and new insights

AE Omolara, A Alabdulatif, OI Abiodun, M Alawida… - Computers & …, 2022 - Elsevier
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of
life undertakings, mandates continuous research pursuits in IoT and its associated …

IoT adoption and application for smart healthcare: a systematic review

M Al-Rawashdeh, P Keikhosrokiani, B Belaton… - Sensors, 2022 - mdpi.com
In general, the adoption of IoT applications among end users in healthcare is very low.
Healthcare professionals present major challenges to the successful implementation of IoT …

A new ensemble-based intrusion detection system for internet of things

A Abbas, MA Khan, S Latif, M Ajaz, AA Shah… - Arabian Journal for …, 2022 - Springer
The domain of Internet of Things (IoT) has witnessed immense adaptability over the last few
years by drastically transforming human lives to automate their ordinary daily tasks. This is …

A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities

EO Abiodun, A Alabdulatif, OI Abiodun… - Neural Computing and …, 2021 - Springer
Specialized data preparation techniques, ranging from data cleaning, outlier detection,
missing value imputation, feature selection (FS), amongst others, are procedures required to …

Cloud computing forensics; challenges and future perspectives: A review

B Cinar, JP Bharadiya - Asian Journal of Research in …, 2023 - research.send4journal.com
Cloud computing has become increasingly popular in recent years, evolving into a
computing paradigm that is both cost-effective and efficient. It has the potential to be one of …

[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

OI Abiodun, M Alawida, AE Omolara… - Journal of King Saud …, 2022 - Elsevier
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …

Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey

AE Omolara, M Alawida, OI Abiodun - Neural computing and applications, 2023 - Springer
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …

Review of telecommunication regulation and policy: comparative analysis USA and Africa

CA Ezeigweneme, AA Umoh, VI Ilojianya… - Computer Science & IT …, 2024 - fepbl.com
This paper presents a comprehensive comparative analysis of telecommunication regulation
and policy frameworks in the United States (USA) and various African countries …

Cryptography algorithms for enhancing IoT security

F Thabit, O Can, AO Aljahdali, GH Al-Gaphari… - Internet of Things, 2023 - Elsevier
In today's fast-paced world, a new technology paradigm known as the Internet of Things
(IoT) is advancing every business. It provides communication between the digital and …