Moatsum Alawida
Orcid: 0000-0001-8146-5843
  According to our database1,
  Moatsum Alawida
  authored at least 50 papers
  between 2019 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
On csauthors.net:
Bibliography
  2025
Lightweight image encryption scheme for IoT environment and machine learning-driven robust S-box selection.
    
  
    Telecommun. Syst., March, 2025
    
  
A fusion of machine learning and cryptography for fast data encryption through the encoding of high and moderate plaintext information blocks.
    
  
    Multim. Tools Appl., March, 2025
    
  
Enhancing privacy in data transmission between IoT devices: A robust encryption and embedding framework for secure and meaningful image communication.
    
  
    J. Inf. Secur. Appl., 2025
    
  
DaE2: Unmasking malicious URLs by leveraging diverse and efficient ensemble machine learning for online security.
    
  
    Comput. Secur., 2025
    
  
  2024
    Multim. Tools Appl., October, 2024
    
  
A Novel Image Encryption Algorithm Based on Cyclic Chaotic Map in Industrial IoT Environments.
    
  
    IEEE Trans. Ind. Informatics, August, 2024
    
  
Enhancing logistic chaotic map for improved cryptographic security in random number generation.
    
  
    J. Inf. Secur. Appl., February, 2024
    
  
    J. Inf. Secur. Appl., 2024
    
  
Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness.
    
  
    Inf., 2024
    
  
Overview of Mobile Attack Detection and Prevention Techniques Using Machine Learning.
    
  
    Int. J. Interact. Mob. Technol., 2024
    
  
Behavioral Analysis of Android Riskware Families Using Clustering and Explainable Machine Learning.
    
  
    Big Data Cogn. Comput., 2024
    
  
Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques.
    
  
    IEEE Access, 2024
    
  
Enhancing Smishing Detection: A Deep Learning Approach for Improved Accuracy and Reduced False Positives.
    
  
    IEEE Access, 2024
    
  
    Proceedings of the Web Information Systems Engineering - WISE 2024 PhD Symposium, Demos and Workshops, 2024
    
  
A Multi-Layered Strategy for Addressing Privacy and Data Security Issues in Metaverse.
    
  
    Proceedings of the 2nd International Conference on Intelligent Metaverse Technologies & Applications, 2024
    
  
    Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024
    
  
    Proceedings of the IEEE/ACM International Conference on Big Data Computing, 2024
    
  
  2023
A blockchain-based federated learning mechanism for privacy preservation of healthcare IoT data.
    
  
    Comput. Biol. Medicine, December, 2023
    
  
Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey.
    
  
    Neural Comput. Appl., November, 2023
    
  
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption.
    
  
    J. Inf. Secur. Appl., November, 2023
    
  
    J. King Saud Univ. Comput. Inf. Sci., June, 2023
    
  
A Comprehensive Study of ChatGPT: Advancements, Limitations, and Ethical Considerations in Natural Language Processing and Cybersecurity.
    
  
    Inf., 2023
    
  
    Proceedings of the IEEE Intl Conf on Dependable, 2023
    
  
  2022
Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey.
    
  
    J. King Saud Univ. Comput. Inf. Sci., November, 2022
    
  
    Wirel. Pers. Commun., 2022
    
  
A Multi-Layer Semantic Approach for Digital Forensics Automation for Online Social Networks.
    
  
    Sensors, 2022
    
  
    Sensors, 2022
    
  
Ensemble deep transfer learning model for Arabic (Indian) handwritten digit recognition.
    
  
    Neural Comput. Appl., 2022
    
  
A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations.
    
  
    J. King Saud Univ. Comput. Inf. Sci., 2022
    
  
    J. King Saud Univ. Comput. Inf. Sci., 2022
    
  
The internet of things security: A survey encompassing unexplored areas and new insights.
    
  
    Comput. Secur., 2022
    
  
A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks During Cyber-Attacks.
    
  
    IEEE Access, 2022
    
  
  2021
    Wirel. Pers. Commun., 2021
    
  
Correction to: A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities.
    
  
    Neural Comput. Appl., 2021
    
  
A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities.
    
  
    Neural Comput. Appl., 2021
    
  
  2020
    J. Inf. Secur. Appl., 2020
    
  
Enhanced digital chaotic maps based on bit reversal with applications in random bit generators.
    
  
    Inf. Sci., 2020
    
  
A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups.
    
  
    IEEE Access, 2020
    
  
    IEEE Access, 2020
    
  
  2019
An image encryption scheme based on hybridizing digital chaos and finite state machine.
    
  
    Signal Process., 2019
    
  
    Signal Process., 2019
    
  
NIML: non-intrusive machine learning-based speech quality prediction on VoIP networks.
    
  
    IET Commun., 2019
    
  
    Clust. Comput., 2019
    
  
    Proceedings of the 8th International Conference on Software and Computer Applications, 2019