You may find my paper list useful for your future work:
■ A. Abusukhon, Z. Mohammad, A. Al-Thaher (2021) An authenticated, secure, and mutable multiple-session-keys protocol based on elliptic curve cryptography and text_to-image encryption algorithm. Concurrency and computation practice and experience. [Science Citation Index].
■ Ahmad Abusukhon, Bilal Hawashin and Mohammad Lafi (2021) An Efficient Algorithm for Reducing the Power Consumption in Offices Using the Internet of Things, International Journal of Advances in Soft Computing and its Applications (IJASCA). http://ijasca.zuj.edu.jo/Volumes.aspx
■ A. Abusukhon, N. Anwar, M. Mohammad, Z., Alghanam, B. (2019) A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm. Journal of Discrete Mathematical Sciences and Cryptography. 22(1) pp. 65- 81. (SCOPUS). https://www.tandfonline.com/doi/abs/10.1080/09720529.2019.1569821
■ A. Abusukhon, B.Wawashin, B. (2015) A secure network communication protocol based on text to barcode encryption algorithm. International Journal of Advanced Computer Science and Applications (IJACSA). (ISI indexing). https://thesai.org/Publications/ViewPaper?Volume=6&Issue=12&Code=IJACSA&Seri alNo=9
■ A. Abusukhon, Talib, M., and Almimi, H. (2014) Distributed Text-to-Image Encryption Algorithm. International Journal of Computer Applications (IJCA), 106 (1). [ available online at : https://www.semanticscholar.org/paper/Distributed-Text-to-Image-Encryption-Algorithm-Ahmad-Mohammad/0764b3bd89e820afc6007b048dac159d98ba5326]
■ A. Abusukhon (2013) Block Cipher Encryption for Text-to-Image Algorithm. International Journal of Computer Engineering and Technology (IJCET). 4(3) , 50-59. http://www.zuj.edu.jo/portal/ahmad-abu-alsokhon/wpcontent/uploads/sites/15/BLOCK-CIPHER-ENCRYPTION-FOR-TEXT-TO-IMAGE ALGORITHM.pdf
■ A. Abusukhon, Talib, M. and Nabulsi, M. (2012) Analyzing the Efficiency of Text-to-Image Encryption Algorithm. International Journal of Advanced Computer Science and Applications ( IJACSA )(ISI indexing) , 3(11), 35 – 38. https://thesai.org/Publications/ViewPaper?Volume=3&Issue=11&Code=IJACSA&Seri alNo=6
■ A. Abusukhon, Talib M., Issa, O. (2012) Secure Network Communication Based on Text to Image Encryption. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 1(4). The Society of Digital Information and Wireless Communications (SDIWC) 2012. https://www.semanticscholar.org/paper/SECURE-NETWORK-COMMUNICATION-BASED-ON-TEXT-TO-IMAGE-Abusukhon-Talib/1d122f280e0d390263971842cc54f1b044df816
I can provide guidance on how to distribute your survey to individuals in the field of artificial intelligence and cybersecurity, but I do not have the capability to directly reach out to everyone in these fields to answer your thesis questions. Here are some steps you can take to distribute your survey effectively:
Identify Target Audience: Determine the specific demographics and characteristics of the individuals you want to survey within the artificial intelligence and cybersecurity fields. This may include researchers, practitioners, academics, students, or professionals with expertise in these areas.
Utilize Professional Networks: Reach out to professional organizations, academic institutions, and online communities focused on artificial intelligence and cybersecurity. You can share your survey link on platforms like LinkedIn, ResearchGate, or specialized forums related to these fields.
Collaborate with Researchers: Establish collaborations with researchers or professors in the field who can help distribute your survey to their networks. They may have access to mailing lists, research groups, or conferences where your survey can reach a wider audience.
Email Campaigns: Send personalized emails to individuals in the field of artificial intelligence and cybersecurity, introducing your survey and explaining its relevance to their expertise. Be clear about the purpose of the survey and how their responses will contribute to your thesis.
Social Media Promotion: Use social media platforms like Twitter, Facebook, or professional groups on platforms like Reddit to share your survey link. Engage with the community by posting about your research topic and inviting participants to take the survey.
Online Survey Platforms: Consider using online survey platforms like SurveyMonkey, Google Forms, or Qualtrics to create and distribute your survey. These platforms offer tools for sharing surveys and collecting responses efficiently.
Follow Ethical Guidelines: Ensure that your survey complies with ethical guidelines for research involving human subjects. Clearly outline the purpose of the survey, maintain respondent confidentiality, and obtain informed consent from participants.
By strategically targeting relevant audiences and utilizing various distribution channels, you can increase the visibility of your survey within the artificial intelligence and cybersecurity communities and gather valuable insights for your thesis research.