Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey

AE Omolara, M Alawida, OI Abiodun - Neural computing and applications, 2023 - Springer
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …

[HTML][HTML] Unveiling the dark side of chatgpt: Exploring cyberattacks and enhancing user awareness

M Alawida, B Abu Shawar, OI Abiodun, A Mehmood… - Information, 2024 - mdpi.com
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful
generative AI model that can simulate human-like dialogues across a variety of domains …

Information security and privacy challenges of cloud computing for government adoption: a systematic review

N Ukeje, J Gutierrez, K Petrova - International Journal of Information …, 2024 - Springer
The advent of new technologies and applications coupled with the COVID-19 pandemic
tremendously increased cloud computing adoption in private and public institutions …

A novel optimized neural network model for cyber attack detection using enhanced whale optimization algorithm

KK Jyothi, SR Borra, K Srilakshmi, PK Balachandran… - Scientific Reports, 2024 - nature.com
Cybersecurity is critical in today's digitally linked and networked society. There is no way to
overestimate the importance of cyber security as technology develops and becomes more …

Detection of Ponzi scheme on Ethereum using machine learning algorithms

IJ Onu, AE Omolara, M Alawida, OI Abiodun… - Scientific Reports, 2023 - nature.com
Security threats posed by Ponzi schemes present a considerably higher risk compared to
many other online crimes. These fraudulent online businesses, including Ponzi schemes …

A fog-edge-enabled intrusion detection system for smart grids

N Tariq, A Alsirhani, M Humayun, F Alserhani… - Journal of Cloud …, 2024 - Springer
Abstract The Smart Grid (SG) heavily depends on the Advanced Metering Infrastructure
(AMI) technology, which has shown its vulnerability to intrusions. To effectively monitor and …

Digital transformation in ecosystems: integrated operations model and its application to fifth-party logistics operators

B Nicoletti, A Appolloni - Journal of Global Operations and Strategic …, 2025 - emerald.com
Purpose The logistics industry has undergone a tremendous transformation. This
transformation is necessary to cope with the fundamental changes in customer expectations …

[PDF][PDF] Security challenges in cloud computing: A comprehensive analysis

JJ Ang'udi - World Journal of Advanced Engineering …, 2023 - pdfs.semanticscholar.org
The security issues surrounding cloud computing, a quickly develo** technology that is
now essential to both personal and business computing, are thoroughly examined in this …

Forensiblock: A provenance-driven blockchain framework for data forensics and auditability

AJ Akbarfam, M Heidaripour, H Maleki… - 2023 5th IEEE …, 2023 - ieeexplore.ieee.org
Maintaining accurate provenance records is paramount in digital forensics, as they underpin
evidence credibility and integrity, addressing essential aspects like accountability and …

A taxonomy on blockchain-based technology in the financial industry: drivers, applications, benefits, and threats

A Alamsyah, S Syahrir - Blockchain and Smart-Contract Technologies for …, 2024 - Springer
Blockchain technology, renowned for its decentralization capabilities, has led to numerous
innovations across various sectors. One of the most heavily regulated sectors, the financial …