Oludare E Omolara

Oludare E Omolara
  • PhD. in Computer Science; Communication and Network Security
  • PhD at University of Abuja

About

39
Publications
62,373
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,271
Citations
Current institution
University of Abuja
Current position
  • PhD
Additional affiliations
September 2018 - present
University of Science Malaysia
Position
  • Research Assistant
February 2011 - December 2013
Ahmadu Bello University
Position
  • Master's Student
Education
July 2017 - December 2019
University of Science Malaysia
Field of study
  • Computer Science and Security

Publications

Publications (39)
Article
Over 5.44 billion people now use the Internet, making it a vital part of daily life, enabling communication, e-commerce, education, and more. However, this huge Internet connectivity also raises concerns about online privacy and security, particularly with the rise of malicious Uniform Resource Locators (URLs). Recently, conventional ensemble model...
Article
Full-text available
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a variety of domains. However, this popularity has attracted the attention of malicious actors who exploit ChatGPT to launch cyberattacks. This paper examines the tactics that adversaries use to...
Article
Different encryption algorithms such as Advanced Encryption Standard (AES), Rivest, Shamir, Adleman (RSA) were proposed to protect the privacy of the data. However, most of these existing methods are vulnerable to a brute-force attack because the cipher text remains unintelligible until the original data is found. Consequently, this problem prompte...
Preprint
Full-text available
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a variety of domains. However, this popularity has attracted the attention of malicious actors who exploit ChatGPT to launch cyberattacks. This paper examines the tactics that adversaries use to...
Article
Full-text available
Security threats posed by Ponzi schemes present a considerably higher risk compared to many other online crimes. These fraudulent online businesses, including Ponzi schemes, have witnessed rapid growth and emerged as major threats in societies like Nigeria, particularly due to the high poverty rate. Many individuals have fallen victim to these scam...
Article
Full-text available
This paper presented an exhaustive survey on the security and privacy issues of drones. These security concerns were thoroughly dissected, particularly the aspect of cybersecurity, which was classified into nine levels. These levels include emerging issues, communication-based attacks, sensors, hardware, hardware-based attacks, software attacks, an...
Preprint
Full-text available
Different encryption algorithms such as Advanced Encryption Standard (AES), Rivest, Shamir, Adleman (RSA) were proposed to protect the privacy of the transmitted data. However, most of these existing methods are vulnerable to a brute-force attack because the cipher text remains unintelligible until the original data is found. Consequently, this pro...
Chapter
Email classification is essential to the trouble of email and pattern recognition. Nowadays, a number of unsolicited messages are circulated over the internet. While plenty of machine learning techniques are a success in detecting textual primarily based on totally unsolicited mail, this isn’t the case for messages spams, which can without difficul...
Article
It is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For instance, data provenance, which records the origins of data, and the record of data usage, update and processing can be introduced to trace malicious vulnerabilities. Thus, data provenance process...
Article
This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime, highlighting the wide spectrum of cyberattacks that occurred around the world. The modus operandi of cyberattack campaigns was revealed by analyzing and considering cyberattacks in the context of major world events. Following what appeared to be substantial gaps be...
Article
Full-text available
The exponential increase in the compromise of sensitive and intellectual properties alludes to the huge price the global community must pay for the digital revolution we are currently experiencing. This irrefutable reality is a major reason why cybersecurity defences continue to be a pressing and timely area of research. Traditional countermeasures...
Article
Full-text available
The staggering development of cyber threats has propelled experts, professionals and specialists in the field of security into the development of more dependable protection systems, including effective intrusion detection system (IDS) mechanisms which are equipped for boosting accurately detected threats and limiting erroneously detected threats si...
Article
Full-text available
Networks are strained by spam, which also overloads email servers and blocks mailboxes with unwanted messages and files. Setting the protective level for spam filtering might become even more crucial for email users when malicious steps are taken since they must deal with an increase in the number of valid communications being marked as spam. By fi...
Article
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of life undertakings, mandates continuous research pursuits in IoT and its associated components. While the rapid evolution of IoTs has facilitated monumental opportunities for humanity, it has also acted as a catalyst precipitating diverse security iss...
Article
Full-text available
Specialized data preparation techniques, ranging from data cleaning, outlier detection, missing value imputation, feature selection (FS), amongst others, are procedures required to get the most out of data and, consequently, get the optimal performance of predictive models for classification tasks. FS is a vital and indispensable technique that ena...
Article
Full-text available
The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health, smart cities, smart homes, intelligent transport, amongst others. However, security often serves as a critical reason for the widespread adoption of any innovation. While the IoT has increased...
Article
Full-text available
Advancements in electronic health record system allow patients to store and selectively share their medical records as needed with doctors. However, privacy concerns represent one of the major threats facing the electronic health record system. For instance, a cybercriminal may use a brute-force attack to authenticate into a patient’s account to st...
Article
Full-text available
In this paper, an enhanced honey encryption (HE) scheme for reinforcing the security of instant messaging systems and confounding the time and resources of malicious persons is presented. HE offers security beyond the brute-force bound by yielding plausible-looking but fake plaintext upon decryption with an incorrect key. Recent developments have s...
Article
Full-text available
The era of artificial neural network (ANN) began with a simplified application in many fields and remarkable success in pattern recognition (PR) even in manufacturing industries. Although significant progress achieved and surveyed in addressing ANN application to PR challenges, nevertheless, some problems are yet to be resolved like whimsical orien...
Article
Full-text available
Communication security deals with attributes such as confidentiality, integrity and availability. The current strategies used to achieve covertness of communication employs encryption. Encryption techniques minimize eavesdropping on the conversation between the conversing parties by transforming the message into an unreadable form. However, it does...
Article
Full-text available
The tumultuous increase in ATM attacks using eavesdropping, shoulder-surfing, has risen great concerns. Attackers often target the authentication stage where a customer may be entering his login information on the ATM and thus use direct observation techniques by looking over the customer's shoulder to steal his passwords. Existing authentication m...
Article
Full-text available
Conventional encryption schemes are susceptible to brute-force attacks. This is because bytes encode utf8 (or ASCII) characters. Consequently, an adversary that intercepts a ciphertext and tries to decrypt the message by brute-forcing with an incorrect key can filter out some of the combinations of the decrypted message by observing that some of th...
Article
Full-text available
We present a comprehensive survey of the Honey Encryption (HE) scheme. Honey Encryption is an encryption scheme that provides resilience against brute-force attack by serving up plausible-looking but fake plaintext for every invalid key used by an intruder to decrypt a message. Our goal is to furnish researchers with the framework of the scheme not...
Article
Social Media (SM) evidence is a new and rapidly emerging frontier in digital forensics. The trail of digital information on social media, if explored correctly, can offer remarkable support in criminal investigations. However, exploring social media for potential evidence and presenting these proofs in court is not a straightforward task. Social me...
Article
Full-text available
Cloud computing has risen as a prevailing computing platform for years to come, impacting the functionality, design and deployment of applications. As cloud computing advance in prominence, it becomes a major hit for attackers and it security issue a huge concern for practitioners. These security issues have given rise to several active researches...
Article
Full-text available
This is a survey of neural network applications in the real-world scenario. It provides a taxonomy of artificial neural networks (ANNs) and furnish the reader with knowledge of current and emerging trends in ANN applications research and area of focus for researchers. Additionally, the study presents ANN application challenges, contributions, compa...
Conference Paper
Full-text available
Information theory and cryptography recognize 'One-Time Pads' as 'Perfect Secrecy' in theory, however, until today, they have remained impractical to use because of its key management and key distribution problems, particularly in having to generate and send a new key each time you need to transmit a message. When a key is used more than once in th...
Article
Full-text available
The goal is to survey big data techniques applications to financial crime prevention and detection in more than two decades. Also, to determine the industrial sector of financial crime that has gathered the most interest and which fields still lack research. The study describes the most common methods for detecting financial crime, indicating some...
Article
Full-text available
The act of terrorism in the last two decades has caused society of many damages and developmental setbacks in which the cost may be inestimable as trillions of United States dollars have been lost globally. This study provides an empirical model technique for assessing individuals towards terrorism using people’s profiling to mitigate frequency att...
Conference Paper
Full-text available
Modern cryptosystems, even though they give confidentiality do not provide resilience against brute-force attacks. Honey encryption (HE) was proposed as a countermeasure to this problem of cryptography. HE is an encryption scheme that supplies valid-looking, but fake plaintext for every incorrect key used by an intruder to decrypt a message. All po...
Article
Full-text available
Many Ciphers have been developed to provide data security. This paper sets out to contribute to the general body of knowledge in the area of classical cryptography by developing a new modified hybrid way of encryption of plaintext. Using of large key spaces with huge number of rounds with multiple complex operations may provide security but at the...

Questions

Question (1)
Question
What are the names of ANN models useful for pattern recognition?
or What are the best performance ANN models use for pattern recognition?

Network

Cited By