Follow
Dr. Abiodun Esther Oludare  Omolara Dada
Dr. Abiodun Esther Oludare Omolara Dada
University of Abuja, Universiti Sains Malaysia
Verified email at uniabuja.edu.ng
Title
Cited by
Cited by
Year
State-of-the-art in artificial neural network applications: A survey
OI Abiodun, A Jantan, AE Omolara, KV Dada, NAE Mohamed, H Arshad
Heliyon 4 (11), e00938, 2018
1705*2018
Comprehensive review of artificial neural network applications to pattern recognition
OI Abiodun, A Jantan, AE Omolara, KV Dada, AM Umar, OU Linus, ...
IEEE Access 7, 158820-158846, 2019
2452019
The internet of things security: A survey encompassing unexplored areas and new insights
AE Omolara, A Alabdulatif, OI Abiodun, M Alawida, A Alabdulatif, ...
Computers & Security 112, 102494, 2022
562022
Evidence collection and forensics on social networks: Research challenges and directions
H Arshad, J Aman, O Esther
Digital Investigation 28, 126-138, 2019
442019
Developing a modified Hybrid Caesar cipher and Vigenere cipher for secure Data Communication
OE Omolara, AI Oludare, SE Abdulahi
Computer Engineering and Intelligent Systems 5 (5), 34-46, 2014
402014
A review on the security of the internet of things: challenges and solutions
OI Abiodun, EO Abiodun, M Alawida, RS Alkhawaldeh, H Arshad
Wireless Personal Communications 119, 2603-2637, 2021
342021
A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities
EO Abiodun, A Alabdulatif, OI Abiodun, M Alawida, A Alabdulatif, ...
Neural Computing and Applications 33 (22), 15091-15118, 2021
292021
An enhanced practical difficulty of one-time pad algorithm resolving the key management and distribution problem
AE Omolara, A Jantan, OI Abiodun, H Arshad
proceedings of the International MultiConference of Engineers and Computer …, 2018
262018
A deception model robust to eavesdropping over communication for social network systems
AE Omolara, A Jantan, OI Abiodun, KV Dada, H Arshad, E Emmanuel
IEEE Access 7, 100881-100898, 2019
182019
Modified honey encryption scheme for encoding natural language message
AE Omolara, A Jantan
International Journal of Electrical and Computer Engineering (IJECE) 9 (3 …, 2019
182019
A novel approach for the adaptation of honey encryption to support natural language message
AE Omolara, A Jantan, OI Abiodun, HE Poston
Proceedings of the International multiconference of engineers and computer …, 2018
182018
HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys
A Esther Omolara, A Jantan, OI Abiodun, H Arshad, KV Dada, ...
Health informatics journal 26 (3), 2083-2104, 2020
172020
A deeper look into cybersecurity issues in the wake of Covid-19: A survey
M Alawida, AE Omolara, OI Abiodun, M Al-Rajab
Journal of King Saud University-Computer and Information Sciences, 2022
132022
A semi-automated forensic investigation model for online social networks
H Arshad, E Omlara, IO Abiodun, A Aminu
Computers & Security 97, 101946, 2020
132020
A comprehensive review of honey encryption scheme
AE Omolara, A Jantan, OI Abiodun
Indonesian Journal of Electrical Engineering and Computer Science 13 (2 …, 2019
122019
Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp
EO Abiodun, A Jantan, OI Abiodun, H Arshad
Wireless Personal Communications, 1-24, 2020
102020
The Use of ICT tools in Tackling Insecurity and Terrorism Problem in Nigeria
Oludare I.A., Omolara E.O., Umar A.M., Kemi V.D.
International Journal of Network and Complex Systems 5 (5), 21-39, 2015
10*2015
Fingereye: improvising security and optimizing ATM transaction time based on iris-scan authentication.
AE Omolara, A Jantan, OI Abiodun, H Arshad, NAE Mohamed
International Journal of Electrical & Computer Engineering (2088-8708) 9 (3), 2019
92019
Forensic DNA profiling for identifying an individual crime
OI Abiodun, A Jantan, MM Singh, M Anbar, ZF Zaaba, OEO Abiodun
International Journal of Civil Engineering and Technology (IJCIET) 9 (7 …, 2018
92018
Cyber intrusion detection system based on a multiobjective binary bat algorithm for feature selection and enhanced bat algorithm for parameter optimization in neural networks
WAHM Ghanem, SAA Ghaleb, A Jantan, AB Nasser, SAM Saleh, A Ngah, ...
IEEE Access 10, 76318-76339, 2022
82022
The system can't perform the operation now. Try again later.
Articles 1–20