Moatsum Alawida

Orcid: 0000-0001-8146-5843

According to our database1, Moatsum Alawida authored at least 41 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards accurate keyspace analysis of chaos-based image ciphers.
Multim. Tools Appl., October, 2024

A Novel Image Encryption Algorithm Based on Cyclic Chaotic Map in Industrial IoT Environments.
IEEE Trans. Ind. Informatics, August, 2024

Enhancing logistic chaotic map for improved cryptographic security in random number generation.
J. Inf. Secur. Appl., February, 2024

A novel DNA tree-based chaotic image encryption algorithm.
J. Inf. Secur. Appl., 2024

Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness.
Inf., 2024

Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques.
IEEE Access, 2024

Enhancing Smishing Detection: A Deep Learning Approach for Improved Accuracy and Reduced False Positives.
IEEE Access, 2024

DNA-Inspired Image Encryption: Leveraging Chaos for Enhanced Security.
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024

2023
A blockchain-based federated learning mechanism for privacy preservation of healthcare IoT data.
Comput. Biol. Medicine, December, 2023

Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey.
Neural Comput. Appl., November, 2023

A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption.
J. Inf. Secur. Appl., November, 2023

A novel chaos-based permutation for image encryption.
J. King Saud Univ. Comput. Inf. Sci., June, 2023

A Comprehensive Study of ChatGPT: Advancements, Limitations, and Ethical Considerations in Natural Language Processing and Cybersecurity.
Inf., 2023

Understanding Cyberterrorism: Exploring Threats, Tools, and Statistical Trends.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

A Group Theoretic Construction of Large Number of AES-Like Substitution-Boxes.
Wirel. Pers. Commun., 2022

A Multi-Layer Semantic Approach for Digital Forensics Automation for Online Social Networks.
Sensors, 2022

IoT Adoption and Application for Smart Healthcare: A Systematic Review.
Sensors, 2022

Ensemble deep transfer learning model for Arabic (Indian) handwritten digit recognition.
Neural Comput. Appl., 2022

A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations.
J. King Saud Univ. Comput. Inf. Sci., 2022

A deeper look into cybersecurity issues in the wake of Covid-19: A survey.
J. King Saud Univ. Comput. Inf. Sci., 2022

The internet of things security: A survey encompassing unexplored areas and new insights.
Comput. Secur., 2022

A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks During Cyber-Attacks.
IEEE Access, 2022

Encrypting Multiple Images With an Enhanced Chaotic Map.
IEEE Access, 2022

2021
A Review on the Security of the Internet of Things: Challenges and Solutions.
Wirel. Pers. Commun., 2021

Blockchain Consensus: An Overview of Alternative Protocols.
Symmetry, 2021

Correction to: A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities.
Neural Comput. Appl., 2021

A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities.
Neural Comput. Appl., 2021

Hybrid SVD-Based Image Watermarking Schemes: A Review.
IEEE Access, 2021

A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence.
IEEE Access, 2021

2020
Implementation and practical problems of chaos-based cryptography revisited.
J. Inf. Secur. Appl., 2020

Enhanced digital chaotic maps based on bit reversal with applications in random bit generators.
Inf. Sci., 2020

A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups.
IEEE Access, 2020

A New Chaotic Image Watermarking Scheme Based on SVD and IWT.
IEEE Access, 2020

A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata.
IEEE Access, 2020

2019
An image encryption scheme based on hybridizing digital chaos and finite state machine.
Signal Process., 2019

A new hybrid digital chaotic system with applications in image encryption.
Signal Process., 2019

NIML: non-intrusive machine learning-based speech quality prediction on VoIP networks.
IET Commun., 2019

A chaos-based keyed hash function based on fixed point representation.
Clust. Comput., 2019

Digital Cosine Chaotic Map for Cryptographic Applications.
IEEE Access, 2019

Enhancing One-Dimensional Chaotic Map Based on Bitstream Dividing Model.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019


  Loading...