[HTML][HTML] A deeper look into cybersecurity issues in the wake of Covid-19: A survey

M Alawida, AE Omolara, OI Abiodun… - Journal of King Saud …, 2022 - Elsevier
This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime,
highlighting the wide spectrum of cyberattacks that occurred around the world. The modus …

Artificial intelligence (AI) and machine learning (ML)-based Information security in electric vehicles: A review

N Mohamed, SK Almazrouei, A Oubelaid… - 2023 5th Global …, 2023 - ieeexplore.ieee.org
The use of artificial intelligence (AI) and machine learning (ML) in electric vehicles (EVs) is
gaining popularity as a means of improving information security. However, there is a lack of …

Detection of Ponzi scheme on Ethereum using machine learning algorithms

IJ Onu, AE Omolara, M Alawida, OI Abiodun… - Scientific Reports, 2023 - nature.com
Security threats posed by Ponzi schemes present a considerably higher risk compared to
many other online crimes. These fraudulent online businesses, including Ponzi schemes …

Air‐Gapped Networks: Exfiltration without Privilege Escalation for Military and Police Units

N Mohamed, SK Almazrouei, A Oubelaid… - Wireless …, 2022 - Wiley Online Library
Several security tools have been described in recent times to assist security teams; however,
the effectiveness and success remain limited to specific devices. Phishing is a type of …

Eye-gesture control of computer systems via artificial intelligence

N Mohamed - F1000Research, 2024 - f1000research.com
Background Artificial Intelligence (AI) offers transformative potential for human-computer
interaction, particularly through eye-gesture recognition, enabling intuitive control for users …

Using AI and kinetic energy to charge mobile devices with human movement

N Mohamed, A Oubelaid, M Bajaj… - 2023 4th IEEE …, 2023 - ieeexplore.ieee.org
As mobile devices become more prevalent, there'sa rising demand for consistent and eco-
friendly ways to charge them. Traditional plug-in methods don't always cut it, especially in …

Leveraging AI and ML Applications for Robust EV Information Security: A Review.

A Sehwag, S Sahoo, A Pokhriyal… - Library of Progress …, 2024 - search.ebscohost.com
Although integrating artificial intelligence and machine learning into electric vehicles to
improve cybersecurity is gaining in popularity, the practical applications of this concept are …

[PDF][PDF] A decentralized consensus application using blockchain ecosystem

C Pujari, B Muniyal, CB Chandrakala - International Journal of …, 2020 - academia.edu
The consensus is a critical operation of any decision-making process. It involves a set of
eligible members; whose decision need to be honored by taking their acknowledgment …

A Comprehensive Review of Natural Language Processing Techniques for Malware Detection

N Mohamed - 2024 15th International Conference on …, 2024 - ieeexplore.ieee.org
In an era marked by the unprecedented proliferation of cybersecurity threats, conventional
malware detection paradigms characterized by signature-based and heuristic …

A Novel Intelligent Intrusion Prevention Framework for Network Applications

R Gangula, S Pratapagiri, SM Bejugama, S Ray… - Wireless Personal …, 2023 - Springer
Nowadays, the intrusion prevention model in network applications is essential in protecting
data from malicious users. The intrusion prevention model involves detecting and removing …