Trend analysis and change point techniques: a survey S Sharma, DA Swayne, C Obimbo Energy, Ecology and Environment 1, 123-130, 2016 | 116 | 2016 |
Improving the security of the medical images A Mahmood, T Hamed, C Obimbo, R Dony Int J Adv Comput Sci Appl 4 (9), 2013 | 44 | 2013 |
A comprehensive keyword analysis of online privacy policies J Kaur, RA Dara, C Obimbo, F Song, K Menard Information Security Journal: A Global Perspective 27 (5-6), 260-275, 2018 | 37 | 2018 |
Toward vehicular digital forensics from decentralized trust: An accountable, privacy-preserving, and secure realization M Li, J Weng, JN Liu, X Lin, C Obimbo IEEE Internet of Things Journal 9 (9), 7009-7024, 2021 | 35 | 2021 |
An intrusion detection system for manet C Obimbo, LM Arboleda-Cobo Communications in Information Science and Management Engineering 2 (3), 2012 | 25 | 2012 |
CaptchAll: an improvement on the modern text-based CAPTCHA C Obimbo, A Halligan, P De Freitas procedia computer science 20, 496-501, 2013 | 22 | 2013 |
A novel differential privacy approach that enhances classification accuracy ANK Zaman, C Obimbo, RA Dara Proceedings of the ninth international C* conference on computer science …, 2016 | 21 | 2016 |
Near-linear wirelength estimation for FPGA placement M Xu, G Gréwal, S Areibi, C Obimbo, D Banerji Canadian Journal of Electrical and Computer Engineering 34 (3), 125-132, 2009 | 21 | 2009 |
A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption C Obimbo, B Salami The Journal of Supercomputing 39, 113-130, 2007 | 18 | 2007 |
An improved data sanitization algorithm for privacy preserving medical data publishing ANK Zaman, C Obimbo, RA Dara Canadian Conference on Artificial Intelligence, 64-70, 2017 | 16 | 2017 |
Privacy preserving data publishing: A classification perspective ANK Zaman, C Obimbo International Journal of Advanced Computer Science and Applications 5 (9), 2014 | 16 | 2014 |
An evolutionary computation attack on one-round TEA EYT Ma, C Obimbo Procedia Computer Science 6, 171-176, 2011 | 14 | 2011 |
How to Protect Personal Information against Keyloggers. M Xu, B Salami, C Obimbo IMSA, 275-280, 2005 | 12 | 2005 |
Using digital watermarking for copyright protection C Obimbo, B Salami Watermarking-Volume 2, 2012 | 11 | 2012 |
Vulnerabilities of LDAP As An Authentication Service. C Obimbo, B Ferriman J. Information Security 2 (4), 151-157, 2011 | 11 | 2011 |
Solving for the RC4 stream cipher state register using a genetic algorithm B Ferriman, C Obimbo International Journal of Advanced Computer Science and Applications 5 (5), 2014 | 10 | 2014 |
Self-organizing feature maps for user-to-root and remote-to-local network intrusion detection on the KDD cup 1999 dataset R Wilson, C Obimbo 2011 World Congress on Internet Security (WorldCIS-2011), 42-47, 2011 | 10 | 2011 |
Blockchain application in healthcare O Ukanah, C Obimbo 2020 International Conference on Computational Science and Computational …, 2020 | 8 | 2020 |
Multiple SOFMs working cooperatively in a vote-based ranking system for network intrusion detection C Obimbo, H Zhou, R Wilson Procedia Computer Science 6, 219-224, 2011 | 8 | 2011 |
Protecting digital images using keys enhanced by 2D chaotic logistic maps M Abu-Faraj, A Al-Hyari, C Obimbo, K Aldebei, I Altaharwa, Z Alqadi, ... Cryptography 7 (2), 20, 2023 | 7 | 2023 |