Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey

AE Omolara, M Alawida, OI Abiodun - Neural computing and applications, 2023 - Springer
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …

[PDF][PDF] A comprehensive review of honey encryption scheme

AE Omolara, A Jantan, OI Abiodun - Indonesian Journal of Electrical …, 2019 - academia.edu
We present a comprehensive survey of the Honey Encryption (HE) scheme. Honey
Encryption is an encryption scheme that provides resilience against brute-force attack by …

HoneyDetails: A prototype for ensuring patient's information privacy and thwarting electronic health record threats based on decoys

A Esther Omolara, A Jantan… - Health informatics …, 2020 - journals.sagepub.com
Advancements in electronic health record system allow patients to store and selectively
share their medical records as needed with doctors. However, privacy concerns represent …

Reinforcing the security of instant messaging systems using an enhanced honey encryption scheme: the case of WhatsApp

EO Abiodun, A Jantan, OI Abiodun… - Wireless Personal …, 2020 - Springer
In this paper, an enhanced honey encryption (HE) scheme for reinforcing the security of
instant messaging systems and confounding the time and resources of malicious persons is …

[PDF][PDF] Epilepsy Radiology Reports Classification Using Deep Learning Networks.

S Bayrak, E Yucel, H Takci - Computers, Materials & Continua, 2022 - academia.edu
The automatic and accurate classification of Magnetic Resonance Imaging (MRI) radiology
report is essential for the analysis and interpretation epilepsy and non-epilepsy. Since the …

[PDF][PDF] Modified honey encryption scheme for encoding natural language message

AE Omolara, A Jantan - International Journal of Electrical and …, 2019 - researchgate.net
Conventional encryption schemes are susceptible to brute-force attacks. This is because
bytes encode utf8 (or ASCII) characters. Consequently, an adversary that intercepts a …

Honey2fish-a hybrid encryption approach for improved password and message security

S Jain, CH Muntean, R Verma - … 9th Intl Conference on Big Data …, 2023 - ieeexplore.ieee.org
Nowadays, there is an upsurge in reliance on web usage. Many of these web applications
make use of password-based authentication. Ensuring a secure password protection …

Enhanced honey encryption algorithm for increasing message space against brute force attack

KSM Moe, T Win - 2018 15th international conference on …, 2018 - ieeexplore.ieee.org
In the era of digitization, data security is a vital role in message transmission and all systems
that deal with users require stronger encryption techniques that against brute force attack …

Fooling an unbounded adversary with a short key, repeatedly: The honey encryption perspective

X Li, Q Tang, Z Zhang - 2nd Conference on Information-Theoretic …, 2021 - drops.dagstuhl.de
This article is motivated by the classical results from Shannon that put the simple and
elegant one-time pad away from practice: key length has to be as large as message length …

Use of neural network based prediction algorithms for powering up smart portable accessories

Z Qadir, E Ever, C Batunlu - Neural Processing Letters, 2021 - Springer
Emerging Trends in the use of smart portable accessories, particularly within the context of
the Internet of Things (IoT), where smart sensor devices are employed for data gathering …