Moatsum Alawida
Cited by
Cited by
A new hybrid digital chaotic system with applications in image encryption
M Alawida, A Samsudin, JS Teh, RS Alkhawaldeh
Signal Processing 160, 45-58, 2019
The internet of things security: A survey encompassing unexplored areas and new insights
AE Omolara, A Alabdulatif, OI Abiodun, M Alawida, A Alabdulatif, ...
Computers & Security 112, 102494, 2022
An Image Encryption Scheme based on Hybridizing Digital Chaos and Finite State Machine
M Alawida, JS Teh, A Samsudin, WH Alshoura
Signal Processing, 2019
A deeper look into cybersecurity issues in the wake of Covid-19: A survey
M Alawida, AE Omolara, OI Abiodun, M Al-Rajab
Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022
Blockchain consensus: An overview of alternative protocols
DP Oyinloye, JS Teh, N Jamil, M Alawida
Symmetry 13 (8), 1363, 2021
Implementation and practical problems of chaos-based cryptography revisited
JS Teh, M Alawida, YC Sii
Journal of Information Security and Applications 50, 102421, 2020
A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities
EO Abiodun, A Alabdulatif, OI Abiodun, M Alawida, A Alabdulatif, ...
Neural Computing and Applications 33 (22), 15091-15118, 2021
A review on the security of the internet of things: Challenges and solutions
OI Abiodun, EO Abiodun, M Alawida, RS Alkhawaldeh, H Arshad
Wireless Personal Communications 119, 2603-2637, 2021
IoT adoption and application for smart healthcare: a systematic review
M Al-Rawashdeh, P Keikhosrokiani, B Belaton, M Alawida, A Zwiri
Sensors 22 (14), 5377, 2022
Enhanced digital chaotic maps based on bit reversal with applications in random bit generators
M Alawida, A Samsudin, JS Teh
Information Sciences 512, 1155-1169, 2020
A New Chaotic Image Watermarking Scheme Based on SVD and IWT
WH Alshoura, Z Zainol, JS Teh, M Alawida
IEEE Access 8, 43391-43406, 2020
A comprehensive study of ChatGPT: advancements, limitations, and ethical considerations in natural language processing and cybersecurity
M Alawida, S Mejri, A Mehmood, B Chikhaoui, O Isaac Abiodun
Information 14 (8), 462, 2023
Hybrid SVD-Based Image Watermarking Schemes: A Review
WH Alshoura, Z Zainol, JS Teh, M Alawida, A Alabdulatif
IEEE Access 9, 32931-32968, 2021
A novel method for generation of strong substitution-boxes based on coset graphs and symmetric groups
A Razaq, H Alolaiyan, M Ahmad, MA Yousaf, U Shuaib, W Aslam, ...
Ieee Access 8, 75473-75490, 2020
A chaos-based keyed hash function based on fixed point representation
JS Teh, K Tan, M Alawida
Cluster Computing 22, 649-660, 2019
Digital cosine chaotic map for cryptographic applications
M Alawida, A Samsudin, JS Teh, WH Alshoura
IEEE Access, 2019
Enhancing unimodal digital chaotic maps through hybridisation
M Alawida, A Samsudin, JS Teh
Nonlinear Dynamics 96, 601-613, 2019
A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations
M Alawida, JS Teh, A Mehmood, A Shoufan, WH Alshoura
Journal of King Saud University-Computer and Information Sciences, 2022
Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
OI Abiodun, M Alawida, AE Omolara, A Alabdulatif
Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022
Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic
JS Teh, M Alawida, JJ Ho
Nonlinear Dynamics, 1-17, 2020
The system can't perform the operation now. Try again later.
Articles 1–20