
Oludare Isaac Abiodun- PhD
- University of Science Malaysia
Oludare Isaac Abiodun
- PhD
- University of Science Malaysia
About
66
Publications
127,684
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,558
Citations
Introduction
Current institution
Publications
Publications (66)
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a variety of domains. However, this popularity has attracted the attention of malicious actors who exploit ChatGPT to launch cyberattacks. This paper examines the tactics that adversaries use to...
Different encryption algorithms such as Advanced Encryption Standard (AES), Rivest, Shamir, Adleman (RSA) were proposed to protect the privacy of the data. However, most of these existing methods are vulnerable to a brute-force attack because the cipher text remains unintelligible until the original data is found. Consequently, this problem prompte...
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a variety of domains. However, this popularity has attracted the attention of malicious actors who exploit ChatGPT to launch cyberattacks. This paper examines the tactics that adversaries use to...
Security threats posed by Ponzi schemes present a considerably higher risk compared to many other online crimes. These fraudulent online businesses, including Ponzi schemes, have witnessed rapid growth and emerged as major threats in societies like Nigeria, particularly due to the high poverty rate. Many individuals have fallen victim to these scam...
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a variety of domains. However, this popularity has attracted the attention of malicious actors who exploit ChatGPT to launch cyberattacks. This paper examines the tactics that adversaries use to...
This paper presented an exhaustive survey on the security and privacy issues of drones. These security concerns were thoroughly dissected, particularly the aspect of cybersecurity, which was classified into nine levels. These levels include emerging issues, communication-based attacks, sensors, hardware, hardware-based attacks, software attacks, an...
Different encryption algorithms such as Advanced Encryption Standard (AES), Rivest, Shamir, Adleman (RSA) were proposed to protect the privacy of the transmitted data. However, most of these existing methods are vulnerable to a brute-force attack because the cipher text remains unintelligible until the original data is found. Consequently, this pro...
This paper presents an in-depth study of ChatGPT, a state-of-the-art language model that is revolutionizing generative text. We provide a comprehensive analysis of its architecture, training data, and evaluation metrics and explore its advancements and enhancements over time. Additionally, we examine the capabilities and limitations of ChatGPT in n...
Email classification is essential to the trouble of email and pattern recognition. Nowadays, a number of unsolicited messages are circulated over the internet. While plenty of machine learning techniques are a success in detecting textual primarily based on totally unsolicited mail, this isn’t the case for messages spams, which can without difficul...
It is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For instance, data provenance, which records the origins of data, and the record of data usage, update and processing can be introduced to trace malicious vulnerabilities. Thus, data provenance process...
This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the world. The modus operandi of cyberattack campaigns was revealed by analyzing and considering cyberattacks in the context of major world events. Following what appeared to be substantial gaps be...
Currently, law enforcement and legal consultants are heavily utilizing social media platforms to easily access data associated with the preparators of illegitimate events. However, accessing this publicly available information for legal use is technically challenging and legally intricate due to heterogeneous and unstructured data and privacy laws,...
The exponential increase in the compromise of sensitive and intellectual properties alludes to the huge price the global community must pay for the digital revolution we are currently experiencing. This irrefutable reality is a major reason why cybersecurity defences continue to be a pressing and timely area of research. Traditional countermeasures...
The staggering development of cyber threats has propelled experts, professionals and specialists in the field of security into the development of more dependable protection systems, including effective intrusion detection system (IDS) mechanisms which are equipped for boosting accurately detected threats and limiting erroneously detected threats si...
Networks are strained by spam, which also overloads email servers and blocks mailboxes with unwanted messages and files. Setting the protective level for spam filtering might become even more crucial for email users when malicious steps are taken since they must deal with an increase in the number of valid communications being marked as spam. By fi...
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of life undertakings, mandates continuous research pursuits in IoT and its associated components. While the rapid evolution of IoTs has facilitated monumental opportunities for humanity, it has also acted as a catalyst precipitating diverse security iss...
Specialized data preparation techniques, ranging from data cleaning, outlier detection, missing value imputation, feature selection (FS), amongst others, are procedures required to get the most out of data and, consequently, get the optimal performance of predictive models for classification tasks. FS is a vital and indispensable technique that ena...
The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health, smart cities, smart homes, intelligent transport, amongst others. However, security often serves as a critical reason for the widespread adoption of any innovation. While the IoT has increased...
Advancements in electronic health record system allow patients to store and selectively share their medical records as needed with doctors. However, privacy concerns represent one of the major threats facing the electronic health record system. For instance, a cybercriminal may use a brute-force attack to authenticate into a patient’s account to st...
In this paper, an enhanced honey encryption (HE) scheme for reinforcing the security of instant messaging systems and confounding the time and resources of malicious persons is presented. HE offers security beyond the brute-force bound by yielding plausible-looking but fake plaintext upon decryption with an incorrect key. Recent developments have s...
Currently, examining social media networks is an integral part of most investigations. However, getting a clear view of the events relevant to the incident from a large set of data, such as social media, is a challenging task. Automation of the forensic and analysis process is the only solution to manage large data sets and get useful information....
The era of artificial neural network (ANN) began with a simplified application in many fields and remarkable success in pattern recognition (PR) even in manufacturing industries. Although significant progress achieved and surveyed in addressing ANN application to PR challenges, nevertheless, some problems are yet to be resolved like whimsical orien...
Communication security deals with attributes such as confidentiality, integrity and availability. The current strategies used to achieve covertness of communication employs encryption. Encryption techniques minimize eavesdropping on the conversation between the conversing parties by transforming the message into an unreadable form. However, it does...
The tumultuous increase in ATM attacks using eavesdropping, shoulder-surfing, has risen great concerns. Attackers often target the authentication stage where a customer may be entering his login information on the ATM and thus use direct observation techniques by looking over the customer's shoulder to steal his passwords. Existing authentication m...
We present a comprehensive survey of the Honey Encryption (HE) scheme. Honey Encryption is an encryption scheme that provides resilience against brute-force attack by serving up plausible-looking but fake plaintext for every invalid key used by an intruder to decrypt a message. Our goal is to furnish researchers with the framework of the scheme not...
Cloud computing has risen as a prevailing computing platform for years to come, impacting the functionality, design and deployment of applications. As cloud computing advance in prominence, it becomes a major hit for attackers and it security issue a huge concern for practitioners. These security issues have given rise to several active researches...
This is a survey of neural network applications in the real-world scenario. It
provides a taxonomy of artificial neural networks (ANNs) and furnish the reader
with knowledge of current and emerging trends in ANN applications research
and area of focus for researchers. Additionally, the study presents ANN
application challenges, contributions, compa...
This paper investigated the high power density problem cause by inefficient cooling system in nuclear power plants. Safety margin test was conducted on some typical water-cooled reactor design (WCRD) models at operational level and at an accident condition, secondly safety margin test was carried out on the thermal efficiency and thermal power outp...
Information theory and cryptography recognize
'One-Time Pads' as 'Perfect Secrecy' in theory, however, until
today, they have remained impractical to use because of its key
management and key distribution problems, particularly in
having to generate and send a new key each time you need to
transmit a message. When a key is used more than once in th...
Assessing individual for a crime like terrorism has become a complex task for
government security personnel. This study provides an empirical model to detect
individual terrorist using deoxyribonucleic acid (DNA) profiling. In the research
design and analysis approach, four metric values of DNA materials guanine, adenine,
thymine, and cytosine form...
The goal is to survey big data techniques applications to financial crime prevention and detection in more than two decades. Also, to determine the industrial sector of financial crime that has gathered the most interest and which fields still lack research. The study describes the most common methods for detecting financial crime, indicating some...
The act of terrorism in the last two decades has caused society of many damages and developmental setbacks in which the cost may be inestimable as trillions of United States dollars have been lost globally. This study provides an empirical model technique for assessing individuals towards terrorism using people’s profiling to mitigate frequency att...
Windows machines utilize a Server Message Block (SMB) for a wide variety of purposes such as a document, printer sharing, and access to remote Windows administrations. However, a challenging issue is that a network system can be easily controlled and compromised remotely using some tools like Armitage in Kali Linux, and using Eternal blue which dev...
Windows machines utilize a Server Message Block (SMB) for a wide variety
of purposes such as a document, printer sharing, and access to remote Windows administrations. However, a challenging issue is that a network system can be easily controlled and compromised remotely using some tools like Armitage in Kali Linux, and using Eternal blue which dev...
Digital forensics is a vital part of almost every criminal investigation given the amount of information available and the opportunities offered by electronic data to investigate and evidence a crime. However, in criminal justice proceedings, these electronic pieces of evidence are often considered with the utmost suspicion and uncertainty, althoug...
Digital forensics is a vital part of almost every criminal investigation given the amount of information available and the opportunities offered by electronic data to investigate and evidence a crime. However, in criminal justice proceedings, these electronic pieces of evidence are often considered with the utmost suspicion and uncertainty, althoug...
This research provides an empirical model approach
to detecting terrorist. The modeling method is an empirical
formula for measuring individual actor’s level of involvement in
terrorism crime. Terrorists are gaining ground virtually in the
most nation of the world. This has become a global challenge as
the attacks have recorded millions of deaths o...
Information theory and cryptography recognize 'One-Time Pads' as 'Perfect Secrecy' in theory, however, until today, they have remained impractical to use because of its key
management and key distribution problems, particularly inhaving to generate and send a new key each time you need to transmit a message. When a key is used more than once in the...
Advanced persistent threats (APTs) is increasingly becoming a major problem in government and organizational computer networks. The next decade is likely to witness a
considerable rise to attack on private and commercial networks unless this problem is curbed. To resolve these threats, there is a need for a countermeasure for preventing
and handlin...
— Modern cryptosystems, even though they give
confidentiality do not provide resilience against brute-force
attacks. Honey encryption (HE) was proposed as a
countermeasure to this problem of cryptography. HE is an
encryption scheme that supplies valid-looking, but fake
plaintext for every incorrect key used by an intruder to
decrypt a message. All...
Advanced persistent threats (APTs) is increasingly
becoming a major problem in government and organizational
computer networks. The next decade is likely to witness a
considerable rise to attack on private and commercial
networks unless this problem is curbed. To resolve these
threats, there is a need for a countermeasure for preventing
and h...
The increased demand of nails in building and construction sector results in a need for better understanding of nails.
An assessment of the quality of mild steel plain wire nails manufactured in Nigeria was carried out using a method
known as statistical process control and corrosion film thickness test. Samples of nails (101mm and 76mm) were
obtai...
The paper seek ICT tools solution to crime and insurgence attack in Nigeria by providing a broad view of the Public Security Communications System (PSCS), Public Safety Networks (PSNs) and National Security Information Centre (NSIC) and some ways that ICT-based technologies can assist security agencies in been more efficient and effective in their...
The research conducted safety margin test on some typical water-cooled reactor design (WCRD) models at an accident situation and at same time loss of emergency power supply occurred, secondly safety margin test was carried out on the thermal efficiency and thermal power output of the reactor when power supply failed and thirdly, safety margin test...
Many Ciphers have been developed to provide data security. This paper sets out to contribute to the general body of knowledge in the area of classical cryptography by developing a new modified hybrid way of encryption of plaintext. Using of large key spaces with huge number of rounds with multiple complex operations may provide
security but at the...
The Design of Reactor Pressure Vessel (RPV) should be that the height of pressure vessel is up to 16.0m and radius is up to 5.6m to ensure safe operation of nuclear reactor. The research conducted safety margin test on the design dimension of RPV in terms of the height and radius, secondly safety margin test was carried out on applied high temperat...
This paper examined the control rod drop-failure in nuclear power plants. Safety margin test was conducted on some typical water-cooled reactor design (WCRD) models at an accident situation, secondly safety margin test was carried out on the thermal efficiency and thermal power output of the reactor when power supply failed and thirdly, safety marg...
The research conducted safety margin test on some typical or experimental design parameter dimensional change of graphite moderated reactor design (GMRD) models in terms of the height and diameter with respect to high temperature effect on the stability of the reactor during operation and secondly, safety margin test was conducted on the
stability...
Nigeria and other nations are looking for solution to their energy crisis and nuclear energy seem to be an option as Federal Government have mandated NAEC, an apex arm of government charge with development of nuclear energy programme for the country to look at the possibility of using nuclear power to generate electricity. The
study investigated ri...
Many Ciphers have been developed to provide data security. This paper sets out to contribute to the general body of knowledge in the area of classical cryptography by developing a new modified hybrid way of encryption of plaintext. Using of large key spaces with huge number of rounds with multiple complex operations may provide security but at the...
The mass of fuel in the operating reactor could contribute to the safety of the reactor. To investigate the cooling problem of the fuel, safety margin test was conducted on design decay heat and design volume of the fuel in the reactor core. Linear Regression Analysis Techniques was applied on some typical Water-Cooled Reactor Design (WCRD) models....
To determined the most stable and probably the safest reactor between water-cooled reactor designs and gascooled reactor designs in terms of their coolant, Linear Regression Analysis is applied on four typical nuclear reactor design models, viz water-cooled reactor design I (WCRD I), water-cooled reactor design II (WCRD II), gas-cooled reactor desi...
To determined the safety margin of different Gas-Cooled Reactor Design, linear regression analysis is applied on
three typical Gas-Cooled Nuclear Reactor design models, viz Gas-Cooled Reactor Design I (GCRD I), Gascooled
Reactor Design II (GCRD II) and Gas-cooled Reactor Design III (GCRD III). Empirical expressions are
obtained for GCRD I model, GC...
Linear regression analysis is applied on two typical Water-Cooled Nuclear Reactor design models, viz Boiling Water Reactor Design I (BWRD I) and Boiling Water Reactor Design II (BWRD II). Empirical expressions are obtained for BWRD I model and BWCRD II model. The results of the statistical analyses on these two types of nuclear reactor models revea...
To investigate loss-of-pressure-control on the stability of a typical water-cooled reactor design models during operation in terms of normal applicable pressure within reactor core and abnormal applicable pressure within reactor core. Linear Regression Analysis Techniques was applied on a typical water-cooled nuclear reactor design models, viz Wate...
This study of pressurized water reactor design models involves the application of linear regression analysis on two typical Water-Cooled Nuclear Reactor design models, viz Pressurized Water Reactor Design I (PWRD I) and Pressurized Water Reactor Design II (PWRD II). Empirical expressions are obtained for PWRD I model and PWRD II model. The results...
Multiple regression analysis is applied on twenty-four (24) typical nuclear reactor design models, each having sixteen (16) major design input parameters. An empirical expression for “Safety Factor”, Ỳ, as a function of the sixteen major design input parameters is obtained. Further statistical analyses suggest that this empirical expression is acce...