关注
Charlie Obimbo
Charlie Obimbo
Professor of Computer Science, University of Guelph
在 uoguelph.ca 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Trend analysis and change point techniques: a survey
S Sharma, DA Swayne, C Obimbo
Energy, Ecology and Environment 1, 123-130, 2016
1162016
Improving the security of the medical images
A Mahmood, T Hamed, C Obimbo, R Dony
Int J Adv Comput Sci Appl 4 (9), 2013
442013
A comprehensive keyword analysis of online privacy policies
J Kaur, RA Dara, C Obimbo, F Song, K Menard
Information Security Journal: A Global Perspective 27 (5-6), 260-275, 2018
372018
Toward vehicular digital forensics from decentralized trust: An accountable, privacy-preserving, and secure realization
M Li, J Weng, JN Liu, X Lin, C Obimbo
IEEE Internet of Things Journal 9 (9), 7009-7024, 2021
352021
An intrusion detection system for manet
C Obimbo, LM Arboleda-Cobo
Communications in Information Science and Management Engineering 2 (3), 2012
252012
CaptchAll: an improvement on the modern text-based CAPTCHA
C Obimbo, A Halligan, P De Freitas
procedia computer science 20, 496-501, 2013
222013
A novel differential privacy approach that enhances classification accuracy
ANK Zaman, C Obimbo, RA Dara
Proceedings of the ninth international C* conference on computer science …, 2016
212016
Near-linear wirelength estimation for FPGA placement
M Xu, G Gréwal, S Areibi, C Obimbo, D Banerji
Canadian Journal of Electrical and Computer Engineering 34 (3), 125-132, 2009
212009
A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption
C Obimbo, B Salami
The Journal of Supercomputing 39, 113-130, 2007
182007
An improved data sanitization algorithm for privacy preserving medical data publishing
ANK Zaman, C Obimbo, RA Dara
Canadian Conference on Artificial Intelligence, 64-70, 2017
162017
Privacy preserving data publishing: A classification perspective
ANK Zaman, C Obimbo
International Journal of Advanced Computer Science and Applications 5 (9), 2014
162014
An evolutionary computation attack on one-round TEA
EYT Ma, C Obimbo
Procedia Computer Science 6, 171-176, 2011
142011
How to Protect Personal Information against Keyloggers.
M Xu, B Salami, C Obimbo
IMSA, 275-280, 2005
122005
Using digital watermarking for copyright protection
C Obimbo, B Salami
Watermarking-Volume 2, 2012
112012
Vulnerabilities of LDAP As An Authentication Service.
C Obimbo, B Ferriman
J. Information Security 2 (4), 151-157, 2011
112011
Solving for the RC4 stream cipher state register using a genetic algorithm
B Ferriman, C Obimbo
International Journal of Advanced Computer Science and Applications 5 (5), 2014
102014
Self-organizing feature maps for user-to-root and remote-to-local network intrusion detection on the KDD cup 1999 dataset
R Wilson, C Obimbo
2011 World Congress on Internet Security (WorldCIS-2011), 42-47, 2011
102011
Blockchain application in healthcare
O Ukanah, C Obimbo
2020 International Conference on Computational Science and Computational …, 2020
82020
Multiple SOFMs working cooperatively in a vote-based ranking system for network intrusion detection
C Obimbo, H Zhou, R Wilson
Procedia Computer Science 6, 219-224, 2011
82011
Protecting digital images using keys enhanced by 2D chaotic logistic maps
M Abu-Faraj, A Al-Hyari, C Obimbo, K Aldebei, I Altaharwa, Z Alqadi, ...
Cryptography 7 (2), 20, 2023
72023
系统目前无法执行此操作,请稍后再试。
文章 1–20