Charlie Obimbo
Orcid: 0000-0001-9422-1522
According to our database1,
Charlie Obimbo
authored at least 34 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
1
2
3
4
5
1
1
1
1
1
1
1
1
1
2
1
1
1
3
3
3
3
4
3
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Generating Powerful Encryption Keys for Image Cryptography With Chaotic Maps by Incorporating Collatz Conjecture.
IEEE Access, 2024
2023
Cryptogr., June, 2023
2022
Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization.
IEEE Internet Things J., 2022
2020
BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain.
IACR Cryptol. ePrint Arch., 2020
2019
A Synergistic Approach to Enhance the Accuracy-interpretability Trade-off of the NECLASS Classifier for Skewed Data Distribution.
Proceedings of the 11th International Joint Conference on Computational Intelligence, 2019
2018
Inf. Secur. J. A Glob. Perspect., 2018
Proceedings of the Recent Trends and Future Technology in Applied Intelligence, 2018
2017
Proceedings of the IEEE Canada International Humanitarian Technology Conference, 2017
An Improved Data Sanitization Algorithm for Privacy Preserving Medical Data Publishing.
Proceedings of the Advances in Artificial Intelligence, 2017
2016
Proceedings of the Ninth International C* Conference on Computer Science & Software Engineering, 2016
2013
Proceedings of the Complex Adaptive Systems 2013 Conference, 2013
2012
Applying Variable Coe_cient functions to Self-Organizing Feature Maps for Network Intrusion Detection on the 1999 KDD Cup Dataset.
Proceedings of the Conference on Systems Engineering Research, 2012
2011
Multiple SOFMs Working Cooperatively In a Vote-based Ranking System For Network Intrusion Detection.
Proceedings of the Complex Adaptive Systems 2011 Conference, 2011
Proceedings of the Complex Adaptive Systems 2011 Conference, 2011
Self-organizing feature maps for User-to-Root and Remote-to-Local network intrusion detection on the KDD Cup 1999 dataset.
Proceedings of the 2011 World Congress on Internet Security, 2011
2009
A Watermark Generation Algorithm Using The Mersenne Twister.
Proceedings of the 2009 International Conference on Image Processing, 2009
An Intrusion Detection System for Mobile Ad-Hoc Networks.
Proceedings of the 2009 International Conference on Security & Management, 2009
Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, 2009
2008
Using the HC for Shape Representation and Description.
Proceedings of the 2008 International Conference on Image Processing, 2008
Approximating the Vertex Cover Problem by Selection of Nodes of Maximum Degrees for use in Wireless Sensor Networks.
Proceedings of the 2008 International Conference on Foundations of Computer Science, 2008
An Adaptive Coding Algorithm for Secret Transmission of Information.
Proceedings of the 2008 International Conference on Security & Management, 2008
2007
A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption.
J. Supercomput., 2007
2006
A Watchdog Enhancement to IDS in MANET.
Proceedings of the Sixth IASTED International Multi-Conference on Wireless and Optical Communications: Conference on Communication Systems and Applications, 2006
A multi-bitwatermark generation algorithm with properties of error correction.
Proceedings of the Third IASTED International Conference on Communication, 2006
A grey-level image watermarking method based on block DCT and statistic correlation adjustment.
Proceedings of the Third IASTED International Conference on Communication, 2006
2005
How to Protect Personal Information against Keyloggers.
Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), 2005
Embedding Digital Signatures in MP3s.
Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), 2005
A System That Can Enhance E-Business In The Developing World.
Proceedings of The 2005 International Conference on E-Business, 2005
A Parallel Algorithm For Determining The Inverse Of A Matrix For Use In Block Cipher Encryption And Decryption.
Proceedings of The 2005 International Conference on Scientific Computing, 2005
2004
The Threat of a Deterministic Polynomial Time Algorithm for Primality Testing in Applied Cryptography.
Proceedings of the International Conference on Modeling, 2004
An Approximate Solution for Steiner Trees in Multicast Routing.
Proceedings of the International Conference on Artificial Intelligence, 2004
An Online Linking System for Researchers.
Proceedings of the International Conference on Internet Computing, 2004
2003
Hierarchical Genetic Algorithms Applied to Datapath Synthesis.
Proceedings of the International Conference on Artificial Intelligence, 2003