Follow
Charlie Obimbo
Title
Cited by
Cited by
Year
Trend analysis and change point techniques: a survey
S Sharma, DA Swayne, C Obimbo
Energy, Ecology and Environment 1, 123-130, 2016
1132016
Improving the security of the medical images
A Mahmood, T Hamed, C Obimbo, R Dony
Int J Adv Comput Sci Appl 4 (9), 2013
432013
A comprehensive keyword analysis of online privacy policies
J Kaur, RA Dara, C Obimbo, F Song, K Menard
Information Security Journal: A Global Perspective 27 (5-6), 260-275, 2018
332018
Toward vehicular digital forensics from decentralized trust: An accountable, privacy-preserving, and secure realization
M Li, J Weng, JN Liu, X Lin, C Obimbo
IEEE Internet of Things Journal 9 (9), 7009-7024, 2021
292021
An intrusion detection system for manet
C Obimbo, LM Arboleda-Cobo
Communications in Information Science and Management Engineering 2 (3), 2012
252012
Near-linear wirelength estimation for FPGA placement
M Xu, G Gréwal, S Areibi, C Obimbo, D Banerji
Canadian Journal of Electrical and Computer Engineering 34 (3), 125-132, 2009
212009
A novel differential privacy approach that enhances classification accuracy
ANK Zaman, C Obimbo, RA Dara
Proceedings of the ninth international C* conference on computer science …, 2016
202016
CaptchAll: an improvement on the modern text-based CAPTCHA
C Obimbo, A Halligan, P De Freitas
procedia computer science 20, 496-501, 2013
202013
A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption
C Obimbo, B Salami
The Journal of Supercomputing 39, 113-130, 2007
192007
An improved data sanitization algorithm for privacy preserving medical data publishing
ANK Zaman, C Obimbo, RA Dara
Canadian Conference on Artificial Intelligence, 64-70, 2017
162017
Privacy preserving data publishing: A classification perspective
ANK Zaman, C Obimbo
International Journal of Advanced Computer Science and Applications 5 (9), 2014
162014
An evolutionary computation attack on one-round TEA
EYT Ma, C Obimbo
Procedia Computer Science 6, 171-176, 2011
132011
How to Protect Personal Information against Keyloggers.
M Xu, B Salami, C Obimbo
IMSA, 275-280, 2005
132005
Using digital watermarking for copyright protection
C Obimbo, B Salami
Watermarking-Volume 2, 2012
112012
Vulnerabilities of LDAP As An Authentication Service.
C Obimbo, B Ferriman
J. Information Security 2 (4), 151-157, 2011
112011
Self-organizing feature maps for user-to-root and remote-to-local network intrusion detection on the KDD cup 1999 dataset
R Wilson, C Obimbo
2011 World Congress on Internet Security (WorldCIS-2011), 42-47, 2011
102011
Solving for the RC4 stream cipher state register using a genetic algorithm
B Ferriman, C Obimbo
International Journal of Advanced Computer Science and Applications 5 (5), 2014
92014
Multiple SOFMs working cooperatively in a vote-based ranking system for network intrusion detection
C Obimbo, H Zhou, R Wilson
Procedia Computer Science 6, 219-224, 2011
82011
Blockchain application in healthcare
O Ukanah, C Obimbo
2020 International Conference on Computational Science and Computational …, 2020
72020
BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain.
M Li, J Weng, JN Liu, X Lin, C Obimbo
IACR Cryptol. ePrint Arch. 2020, 11, 2020
72020
The system can't perform the operation now. Try again later.
Articles 1–20