default search action
Moatsum Alawida
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Abid Mehmood, Arslan Shafique, Moatsum Alawida, Abdul Nasir Khan:
Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques. IEEE Access 12: 27530-27555 (2024) - [j37]Muhammad Khalid Mehmood, Humaira Arshad, Moatsum Alawida, Abid Mehmood:
Enhancing Smishing Detection: A Deep Learning Approach for Improved Accuracy and Reduced False Positives. IEEE Access 12: 137176-137193 (2024) - [j36]Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, Abid Mehmood, Abiodun Esther Omolara, Ahmad K. Al Hwaitat:
Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness. Inf. 15(1): 27 (2024) - [j35]Moatsum Alawida:
Enhancing logistic chaotic map for improved cryptographic security in random number generation. J. Inf. Secur. Appl. 80: 103685 (2024) - [j34]Moatsum Alawida:
A novel DNA tree-based chaotic image encryption algorithm. J. Inf. Secur. Appl. 83: 103791 (2024) - [j33]Abubakar Abba, Je Sen Teh, Moatsum Alawida:
Towards accurate keyspace analysis of chaos-based image ciphers. Multim. Tools Appl. 83(33): 79047-79066 (2024) - [j32]Moatsum Alawida:
A Novel Image Encryption Algorithm Based on Cyclic Chaotic Map in Industrial IoT Environments. IEEE Trans. Ind. Informatics 20(8): 10530-10541 (2024) - [c3]Moatsum Alawida, Ahmad Nasser Aljaghbeir, Khaled Raed Albaz, Rahaf Adam Alnuaimi:
DNA-Inspired Image Encryption: Leveraging Chaos for Enhanced Security. DCOSS-IoT 2024: 477-482 - 2023
- [j31]Wided Moulahi, Imen Jdey, Tarek Moulahi, Moatsum Alawida, Abdulatif Alabdulatif:
A blockchain-based federated learning mechanism for privacy preservation of healthcare IoT data. Comput. Biol. Medicine 167: 107630 (2023) - [j30]Moatsum Alawida, Sami Mejri, Abid Mehmood, Belkacem Chikhaoui, Oludare Isaac Abiodun:
A Comprehensive Study of ChatGPT: Advancements, Limitations, and Ethical Considerations in Natural Language Processing and Cybersecurity. Inf. 14(8): 462 (2023) - [j29]Abid Mehmood, Arslan Shafique, Shehzad Ashraf Chaudhry, Moatsum Alawida, Abdul Nasir Khan, Neeraj Kumar:
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption. J. Inf. Secur. Appl. 78: 103590 (2023) - [j28]Moatsum Alawida:
A novel chaos-based permutation for image encryption. J. King Saud Univ. Comput. Inf. Sci. 35(6): 101595 (2023) - [j27]Abiodun Esther Omolara, Moatsum Alawida, Oludare Isaac Abiodun:
Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey. Neural Comput. Appl. 35(31): 23063-23101 (2023) - [c2]Rahaf Adam Alnuaimi, Moatsum Alawida:
Understanding Cyberterrorism: Exploring Threats, Tools, and Statistical Trends. DASC/PiCom/CBDCom/CyberSciTech 2023: 1155-1162 - 2022
- [j26]Olayiwola Tokunbo Taofeek, Moatsum Alawida, Abdulatif Alabdulatif, Abiodun Esther Omolara, Oludare Isaac Abiodun:
A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks During Cyber-Attacks. IEEE Access 10: 41457-41476 (2022) - [j25]Dolendro Singh Laiphrakpam, Rohit Thingbaijam, Motilal Singh Khoirom, Moatsum Alawida:
Encrypting Multiple Images With an Enhanced Chaotic Map. IEEE Access 10: 87844-87859 (2022) - [j24]Abiodun Esther Omolara, Abdullah A. Alabdulatif, Oludare Isaac Abiodun, Moatsum Alawida, Abdulatif Alabdulatif, Wafa' Hamdan Alshoura, Humaira Arshad:
The internet of things security: A survey encompassing unexplored areas and new insights. Comput. Secur. 112: 102494 (2022) - [j23]Moatsum Alawida, Je Sen Teh, Abid Mehmood, Abdulhadi Shoufan, Wafa' Hamdan Alshoura:
A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8136-8151 (2022) - [j22]Moatsum Alawida, Abiodun Esther Omolara, Oludare Isaac Abiodun, Murad Al-Rajab:
A deeper look into cybersecurity issues in the wake of Covid-19: A survey. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8176-8206 (2022) - [j21]Oludare Isaac Abiodun, Moatsum Alawida, Abiodun Esther Omolara, Abdulatif Alabdulatif:
Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 10217-10245 (2022) - [j20]Rami S. Alkhawaldeh, Moatsum Alawida, Nawaf Farhan Funkur Alshdaifat, Wafa' Za'al Alma'aitah, Ammar Almasri:
Ensemble deep transfer learning model for Arabic (Indian) handwritten digit recognition. Neural Comput. Appl. 34(1): 705-719 (2022) - [j19]Humaira Arshad, Saima Abdullah, Moatsum Alawida, Abdulatif Alabdulatif, Oludare Isaac Abiodun, Omer Riaz:
A Multi-Layer Semantic Approach for Digital Forensics Automation for Online Social Networks. Sensors 22(3): 1115 (2022) - [j18]Manal Al-rawashdeh, Pantea Keikhosrokiani, Bahari Belaton, Moatsum Alawida, Abdalwhab Zwiri:
IoT Adoption and Application for Smart Healthcare: A Systematic Review. Sensors 22(14): 5377 (2022) - [j17]Abdul Razaq, Musheer Ahmad, Awais Yousaf, Moatsum Alawida, Atta Ullah, Umer Shuaib:
A Group Theoretic Construction of Large Number of AES-Like Substitution-Boxes. Wirel. Pers. Commun. 122(3): 2057-2080 (2022) - 2021
- [j16]Moatsum Alawida, Azman Samsudin, Nancy Alajarmeh, Je Sen Teh, Musheer Ahmad, Wafa' Hamdan Alshoura:
A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence. IEEE Access 9: 17882-17897 (2021) - [j15]Wafa' Hamdan Alshoura, Zurinahni Zainol, Je Sen Teh, Moatsum Alawida, Abdulatif Alabdulatif:
Hybrid SVD-Based Image Watermarking Schemes: A Review. IEEE Access 9: 32931-32968 (2021) - [j14]Esther Omolara Abiodun, Abdulatif Alabdulatif, Oludare Isaac Abiodun, Moatsum Alawida, Abdullah A. Alabdulatif, Rami S. Alkhawaldeh:
A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities. Neural Comput. Appl. 33(22): 15091-15118 (2021) - [j13]Esther Omolara Abiodun, Abdulatif Alabdulatif, Oludare Isaac Abiodun, Moatsum Alawida, Abdullah A. Alabdulatif, Rami S. Alkhawaldeh:
Correction to: A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities. Neural Comput. Appl. 33(22): 15119 (2021) - [j12]Damilare Peter Oyinloye, Je Sen Teh, Norziana Jamil, Moatsum Alawida:
Blockchain Consensus: An Overview of Alternative Protocols. Symmetry 13(8): 1363 (2021) - [j11]Oludare Isaac Abiodun, Esther Omolara Abiodun, Moatsum Alawida, Rami S. Alkhawaldeh, Humaira Arshad:
A Review on the Security of the Internet of Things: Challenges and Solutions. Wirel. Pers. Commun. 119(3): 2603-2637 (2021) - 2020
- [j10]Wafa' Hamdan Alshoura, Zurinahni Zainol, Je Sen Teh, Moatsum Alawida:
A New Chaotic Image Watermarking Scheme Based on SVD and IWT. IEEE Access 8: 43391-43406 (2020) - [j9]Abdul Razaq, Hanan Alolaiyan, Musheer Ahmad, Muhammad Awais Yousaf, Umer Shuaib, Waqar Aslam, Moatsum Alawida:
A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups. IEEE Access 8: 75473-75490 (2020) - [j8]Moatsum Alawida, Je Sen Teh, Damilare Peter Oyinloye, Wafa' Hamdan Alshoura, Musheer Ahmad, Rami S. Alkhawaldeh:
A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata. IEEE Access 8: 113163-113174 (2020) - [j7]Moatsum Alawida, Azman Samsudin, Je Sen Teh:
Enhanced digital chaotic maps based on bit reversal with applications in random bit generators. Inf. Sci. 512: 1155-1169 (2020) - [j6]Je Sen Teh, Moatsum Alawida, You Cheng Sii:
Implementation and practical problems of chaos-based cryptography revisited. J. Inf. Secur. Appl. 50 (2020)
2010 – 2019
- 2019
- [j5]Moatsum Alawida, Azman Samsudin, Je Sen Teh, Wafa' Hamdan Alshoura:
Digital Cosine Chaotic Map for Cryptographic Applications. IEEE Access 7: 150609-150622 (2019) - [j4]Je Sen Teh, Kaijun Tan, Moatsum Alawida:
A chaos-based keyed hash function based on fixed point representation. Clust. Comput. 22(2): 649-660 (2019) - [j3]Rami S. Alkhawaldeh, Saed Khawaldeh, Usama Pervaiz, Moatsum Alawida, Hamzah Alkhawaldeh:
NIML: non-intrusive machine learning-based speech quality prediction on VoIP networks. IET Commun. 13(16): 2609-2616 (2019) - [j2]Moatsum Alawida, Azman Samsudin, Je Sen Teh, Rami S. Alkhawaldeh:
A new hybrid digital chaotic system with applications in image encryption. Signal Process. 160: 45-58 (2019) - [j1]Moatsum Alawida, Je Sen Teh, Azman Samsudin, Wafa' Hamdan Alshoura:
An image encryption scheme based on hybridizing digital chaos and finite state machine. Signal Process. 164: 249-266 (2019) - [c1]Moatsum Alawida, Azman Samsudin, Wafa' Hamdan Alshoura:
Enhancing One-Dimensional Chaotic Map Based on Bitstream Dividing Model. ICSCA 2019: 130-134
Coauthor Index
aka: Esther Omolara Abiodun
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint