Selected Publications
Journal publications:
- Zaman, A. N. K., Obimbo, C. & Dara, R. (2016). A Novel Differential Privacy Approach that Enhances Classification Accuracy.
C32SE-16. July 20-22, 2016. Pp 79 - 84.
- Sharma, S., Swayne, D., & Obimbo, C. (2015). Identification of concurrent control chart patterns in time series. International Journal
of Innovative Research in Science Engineering & Technology, 1-17. Accepted for publication.
- Sharma, S., Swayne, D. A., & Obimbo, C. (2015). Automating the Smoothing of Time Series Data. Journal of Environmental & Analytical
Toxicology, 5 (5), 216 - 223, doi: 10.4172/2161-0525.1000304.
- Sharma, S., Swayne, D. A., & Obimbo, C. A. (2015). Identification of Concurrent Control Chart Patterns in Time Series.
International Journal of Innovative Research in Science, Engineering and Technology, 4 (4), 5032-5038, doi: 10.15680/IJIRSET.2015.0406167.
- Zaman, A. N. K. & Obimbo, C. (2014). Privacy Preserving Data Publishing. International Journal of Advanced Computer Science and
Applications, 5 (5), 216 - 223, doi: 10.14569/IJACSA.2013.041206.
- Benjamin Ferriman and Charlie Obimbo. Solving For The RC4 Stream Cipher State Register Using A Genetic Algorithm. International
Journal of Advanced Computer Science and Applications (IJACSA), 5(5), (2014).
http://thesai.org/Downloads/Volume5No5/Paper_33-Solving_for_the_RC4_stream_cipher_state_
register.pdf. pp 216 - 223. DOI: 10.14569/IJACSA.2013.041206.
- Dragan Lazic and Charlie Obimbo. Anonymous Broadcast Messages. International Journal of Advanced Computer Science and Applications
(IJACSA), 4(12), (2013). http://dx.doi.org/10.14569/IJACSA.2013.041206 pp 36 - 41. DOI: 10.14569/IJACSA.2013.041206.
- Ahmed Mahmood, Tarfa Hamed, Charlie Obimbo, Robert Dony. Improving the Security of the Medical Images. International Journal of
Advanced Computer Science and Applications ( IJACSA ) , 4(9), 137 - 146. October, (2013). http://dx.doi.org/10.14569/IJACSA.2013.040922. DOI:
10.14569/IJACSA.2013.040922.
- Charlie Obimbo & Liliana Maria Arboleda-Cobo. An Intrusion Detection System for MANET. CISME Vol.2 No.3 (2012) pp.1-5. www.jcisme.org.
World Academic Publishing.
- C. Obimbo and M. Jones. Applying Variable Coefficient functions to Self-Organizing Feature Maps for Network Intrusion Detection on the
1999 KDD Cup Dataset. Procedia Computer Science, Volume 8, (2012), Pages 333-337.
- R. Wilson and C. Obimbo. Improvements on Self-Organizing Feature Maps for Network Intrusion Detection on the 1999 KDD Cup Dataset.
International Journal of Internet Technology and Secured Transactions (IJITST), (2011).
- C. Obimbo and B. Ferriman Vulnerabilities of LDAP As An Authentication Service. Journal of Information Security (JIS), (2011).
pp 151 - 157.
- R. Wilson and C. Obimbo. Self-Organizing Feature Maps for User-to-Root and Remote-to-Local Network Intrusion Detection on the KDD Cup
1999 Dataset. IEEEXplore, 978-0-9564263-7/6, (2011) IEEE, pp. 42-47.
- M. Xu, G. Grewal, S. Areibi, C. Obimbo and D.Banerji. Near-Linear Wirelength Estimation for FPGA Placement. IEEE Canadian Journal of
Electrical and Computer Engineering, Vol. 34, No. 3, (Summer 2009), pp. 125-132.
- C. Obimbo and B. Salami. A Parallel Algorithm for Determining
the Inverse of a Matrix for use in Block Cipher
Encryption/Decryption. The Journal of Supercomputing (Kluwer)
39(2): 113 - 130, (Feb 2007).
Other refereed publications:
- Charlie Obimbo, Andrew Halligan, Patrick De Freitas. CaptchAll: An Improvement on the Modern Text-Based CAPTCHA. Proceedings of
Complex Adaptive Systems. November 13-15, (2013), Baltimore, MD, pp 496-501.
- C. Obimbo and W. Wang. A Fuzzy Clustering Algorithm for Fingerprint Enhancement. Accepted and to be presented at The 2011
International Conference on Security and Management (SAM'11: July 18-21, 2011, USA). pp 405 - 408.
- E. Ma and C. Obimbo. Attacking TEA with Genetic Algorithm Harmony Search over Known Plaintext. Submitted to The Computational
Intelligence and Machine Learning Section of The Complex Adaptive Systems 2011 Conference in Chicago, Illinois, October, 2011. pp 171 - 176.
- C. Obimbo, H. Zhou and R. Wilson. Multiple SOFMs Working Cooperatively in a Vote-based Ranking System for Network Intrusion Detection.
Submitted to The Computational Intelligence and Machine Learning Section of The Complex Adaptive Systems 2011 Conference in Chicago, Illinois
October, 2011. pp 219-224.
- C. Obimbo. and Y. Zhang. Using Data Mining Techniques for Inquiry Learning. The 2011 International Conference on Frontiers in
Education: Computer Science and Computer Engineering (FECS'11: July 18-21, 2011, USA). pp 251 - 254.
- C. Obimbo. and W. Wang. A Fuzzy Clustering Algorithm for Fingerprint Enhancement. The 2011 International Conference on Security and
Management (SAM'11: July 18-21, 2011, USA). pp 405 - 408.
- R. Wilson and C. Obimbo. Self-Organizing Feature Maps for User-to-Root and Remote-to-Local Network Intrusion Detection on the KDD Cup
1999 Dataset. Proceedings of the World Congress on Internet Security (WorldCIS-2011), February 21-23, 2011, London, UK. pp. 56-61.
- Charlie Obimbo. An Intrusion Detection System for Mobile Ad-Hoc Networks. Proceedings of The 2009 International Conference on Security
and Management (SAM'09), pp 285--290, July 13-16, 2009.
- Charlie Obimbo. A Watermark Generation Algorithm Using The Mersenne Twister. Proceedings of The 2009 International Conference on Image
Processing, Computer Vision, and Pattern Recognition (IPCV'09), pp 331--336, July 13-16, 2009.
- M. Xu, G. Grewal, S. Areibi, C. Obimbo and D.Banerji Near-Linear Wirelength Estimation for FPGA Placement. IEEE Canadian Conference on
Electrical and Computer Engineering, CCECE'09, Newfoundland, Canada, May 2009, pp. 1198-1203. Best Paper Award.
- C. Obimbo and B. Salami. DIGICOP: A Copyright Protection Algorithm for Digital Images. TIC - STH 2009. pp 927 - 932. URL
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=05444366.
- C. Obimbo and Y. Ebrahim. Using the HC for Shape Representation and Description. Proceedings of The 2008 International Conference on
Image Processing, Computer Vision, and Pattern Recognition (IPCV'08), July 14-17, 2008.
- C. Obimbo. Approximating the Vertex Cover Problem by Selection of Nodes of Maximum Degrees for use in Wireless Sensor Networks.
Proceedings of The 2008 International Conference on Foundations of Computer Science (FCS'08), July 14-17, 2008.
- C. Obimbo. An Adaptive Coding Algorithm for Secret Transmission of Information. Proceedings of The 2008 International Conference on
Security and Management (SAM'08), July 14-17, 2008.
- C. Obimbo. Tips in Successfully Dealing with Large. WCCCE'07 - 12th Annual Western Canadian Conference on Computing Education,
Thompson Rivers University, Kamloops, BC, May 5, 2007.
- C. Obimbo, W. Wang, J. Tian, G. Grewal. Fingerprint Enhancement and Segmentation. Proceedings of the Conference on Artificial
Neural Networks in Engineering, St. Louis, MO, USA. November 5-8, 2006.
- C. Obimbo, J. Ni: A Grey-level Image Watermarking Method Based On Block DCT and Statistic Correlation Adjustment. Communication, Network, and Information Security 2006: 22-27.
- C. Obimbo, F. Haji, L. Lindsay, and D. Patel. Security Framework for Supervisory Control and Data Acquisition, Automation Systems and Networks. IASTED conference on Communication,
Network, and Information Security" (CNIS 2006), Cambridge,
Mass., October 9-11, 2006.
- C. Obimbo, B. Salami. A multi-bitwatermark generation algorithm with properties of error correction. IASTED conference on Communication, Network, and Information
Security" (CNIS 2006), Cambridge, Mass., October 9-11, 2006, 44-49.
- C. Obimbo, L.M. Arboleda C., Y. Chen. A Watchdog Enhancement
to IDS in MANET. IASTED conference on Wireless Networks" (WNET2006), Banff, Canada, July 3 - 5, 2006.
- C. Obimbo and Y. Zhang. An LSB-Based Watermarking
Algorithm for Grayscale Images. IASTED conference on
"Communication, Network, and Information Security"
(CNIS 2005). Phoenix AZ.
- A. Koso, A. Turi, and C. Obimbo. Embedding Digital
Signatures in MP3s. Internet and Multimedia Systems and
Applications (IMSA) 2005: Copyright and Security.
(IMSA) ed. M. H. Hamsa. pp 271-274. Honolulu, Hawaii, USA,
August 15-17th, 2005.
- M. Xu, B. Salami, and C. Obimbo. How to Protect Personal
Information against Keyloggers. Internet and Multimedia
Systems and Applications (IMSA) 2005: Copyright and Security
(IMSA) ed. M. H. Hamsa. pp 275-280. Honolulu, Hawaii, USA,
August 15-17th, 2005.
- Charlie Obimbo. A Parallel Algorithm for Determining the
Inverse of a Matrix for Use in Block Cipher Encryption and
Decryption. The 2005 International Conference on Scientific
Computing (CSC05), ed. Hamid R. Arabnia. pp 164-169. Las
Vegas, NV, June 20-23, 2005.
- Charlie Obimbo and Nhi Tonnu. A System That Can Enhance
E-Business in The Developing. The 2005 International Conference
on E-Business, Enterprise Information Systems, E-Government,
and Outsourcing (EEE05), ed. Hamid R. Arabnia. pp 68-74. Las
Vegas, NV, June 20-23, 2005.
- Charlie Obimbo and Rohit Makhijani. An Online Linking System for
Researchers. 2004 International Conference on Internet Computing
(IC'04), eds. Hamid R. Arabnia, Olaf Droegehorn, pp 455 - 458.
Las Vegas, NV, June 21-24, 2004.
- Charlie Obimbo and Stephen Doxsee. The Threat of a
Deterministic Polynomial Time Algorithm for Primality Testing In
Applied Cryptography. 2004 International Conference on Algorithmic Mathematics and Computer Science (AMCS'04), eds. Hamid
R. Arabnia, Iyad A. Ajwa, & George A. Gravvanis. pp 423 - 426.
Las Vegas, NV, June 21-24, 2004.
- Charlie Obimbo and Nhi Tonnu. A Web Based Pre-Admission
Evaluation for CIS MSc. Application. The WCCCE'04, Proceedings of
the 9th West Canadian Conference on Computing Education, eds. Ian
Cavers & George Tsiknis, pp 153 - 160. Okanagan University
College, Kelowna, BC; May 6 - 7, 2004.
- Charlie Obimbo. On the Concept of Enumerability of Infinite
Sets. The WCCCE'04, Proceedings of the 9th West Canadian
Conference on Computing Education, eds. Ian Cavers & George
Tsiknis, pp 161 - 166. Okanagan University College, Kelowna, BC;
May 6 - 7, 2004.
- Gary Grewal, M. Xu, and C. Obimbo. An Approximate Solution
for Steiner Trees in Multicast Routing. The 2004 International
Conference on Artificial Intelligence (ICAI'04), eds. Hamid R.
Arabnia, Oscar Castillo, R. Joshua et al. pp 707 - 711. June
21-24, 2004, Las Vegas, Nevada, USA.
- Charlie Obimbo, Fangju Wang and Weihong Xu. Panoramic Images from
Digital Video Clips. International Conference on Artificial
Intelligence (IC-AI'03): June 23-26, 2003, Las Vegas, Nevada, USA.
- Gary Grewal, Michael O'Cleirigh and Charlie Obimbo. Hierarchical
Genetic Algorithms in Datapath Synthesis. The 2003 International
Conference on Artificial Intelligence (IC-AI'03): June 23-26, 2003,
Las Vegas, Nevada, USA, .
- Charlie Obimbo. Solving Divide and Conquer Recurrences By Master
Theorem a la Charlie. The WCCCE'03, Proceedings of the 8th West
Canadian Conference on Computing Education, eds. Ian Cavers &
George Tsiknis, pp 201 - 217. North Island College, Courtenay, BC;
May 1 - 2, 2003
- Charlie Obimbo. A New Method to Order Functions by Asymptotic
Growth Rates. The WCCCE'03, Proceedings of the 8th West
Canadian Conference on Computing Education, eds. Ian Cavers &
George Tsiknis, pp 219 - 229. North Island College, Courtenay,
BC; May 1 - 2, 2003.
- Charlie Obimbo. An Algorithm to Solve the Chinese Remainder Problem.
The 2001 International Conference on Parallel and Distributed
Processing Techniques and Applications (PDPTA'2001), Las Vegas,
Nevada, USA; June 25-28, 2001, 2246-2250.
- Charlie Obimbo. The ACTs Machine: A Query Processing Engine for
Disjunctive Deductive Databases. Proceedings of International
Conference on Artificial Intelligence (IC-AI'2001, June 25-28,
2001), Monte Carlo Resort, Las Vegas, Nevada, USA, 1581-1587.
- Charlie Obimbo. Access Clause Trees in Disjunctive Deductive
Databases. Ph.D. Thesis, University of New Brunswick, May 2000.
- Charlie Obimbo and Bruce Spencer. T-priority: A Resolution
Strategy for Deductive Databases. Proceedings of International
Conference on Artificial Intelligence (IC-AI'2000, June 26 - 29,
2000), Monte Carlo Resort, Las Vegas, Nevada, USA, 1550-1556.
- Charlie Obimbo. T-priority: A restrictive Strategy. Proceedings
of the 12th Annual Atlantic Mathematics and Computing Science
Conference, Saint Mary's University, Halifax, Nova Scotia, Canada,
October 16-18, 1998.
- Charlie Obimbo. Towards an efficient Disjunctive Deductive
Database Engine. Proceedings of the 11th Annual Atlantic
Mathematics and Computing Science Conference, University of New
Brunswick, Fredericton, NB, Canada, October 1997.
- Charlie Obimbo. Using Clause Trees in Disjunctive Logic
Programming. Proceedings of the 10th Annual Atlantic Mathematics
and Computing Science Conference, Universite de Moncton, NB,
Canada, November 1996.
- Charlie Obimbo and Bruce Spencer. Access Clause Trees in
Disjunctive Deductive Databases. Proceedings of IJCSLP'96
Conference, Bonn, Germany. September, 1996.
- Charlie Obimbo and Bruce Spencer. Disjunctive Deductive
Databases. Technical Report, University of New Brunswick.
TR96-110, August 1996. Available from:
http://www.cs.unb.ca/tech-reports/files/TR96_110.pdf.